Sciweavers

2050 search results - page 386 / 410
» constraints 2010
Sort
View
CL
2010
Springer
13 years 7 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 7 months ago
Ergodic and Outage Performance of Fading Broadcast Channels with 1-Bit Feedback
In this paper, the ergodic sum-rate and outage probability of a downlink single-antenna channel with K users are analyzed in the presence of Rayleigh flat fading, where limited cha...
Bo Niu, Osvaldo Simeone, Oren Somekh, Alexander M....
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 7 months ago
Limited Feedback Multi-Antenna Quantization Codebook Design-Part I: Single-User Channels
Abstract--In this two-part paper, we study the design and optimization of limited feedback single-user and multiuser systems with a multiple-antenna base station and single-antenna...
Behrouz Khoshnevis, Wei Yu
CORR
2010
Springer
204views Education» more  CORR 2010»
13 years 7 months ago
Limited Feedback Multi-Antenna Quantization Codebook Design-Part II: Multiuser Channels
This is the second part of a two-part paper on optimal design of limited feedback single-user and multiuser spatial multiplexing systems. The first part of the paper studies the si...
Behrouz Khoshnevis, Wei Yu
CORR
2010
Springer
170views Education» more  CORR 2010»
13 years 7 months ago
Slow Adaptive OFDMA Systems Through Chance Constrained Programming
Adaptive orthogonal frequency division multiple access (OFDMA) has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wire...
William Weiliang Li, Ying Jun Zhang, Anthony Man-C...