• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,097
Next 10 →

A Framework for Quality of Service with a Multiple Access Strategy

by Easwar Vivek Mangipudi, Venkatesh Ramaiyan
"... Abstract—We study a problem of scheduling real-time traffic with hard delay constraints in an unreliable wireless channel. Packets arrive at a constant rate to the network and have to be delivered within a fixed number of slots in a fading wireless channel. For an infrastructure mode of traffic with ..."
Abstract - Add to MetaCart
vectors with the multiple access technique and study throughput optimal and utility maximizing strategies for the network scenario. Using simulations, we evaluate the performance of the proposed strategy and discuss its advantages. I.

Computation over Multiple-Access Channels

by Bobak Nazer, Michael Gastpar - IEEE TRANSACTIONS ON INFORMATION THEORY , 2007
"... The problem of reliably reconstructing a function of sources over a multiple-access channel is considered. It is shown that there is no source-channel separation theorem even when the individual sources are independent. Joint sourcechannel strategies are developed that are optimal when the structure ..."
Abstract - Cited by 139 (24 self) - Add to MetaCart
The problem of reliably reconstructing a function of sources over a multiple-access channel is considered. It is shown that there is no source-channel separation theorem even when the individual sources are independent. Joint sourcechannel strategies are developed that are optimal when

A survey on visual surveillance of object motion and behaviors

by Weiming Hu, Tieniu Tan, Liang Wang, Steve Maybank - IEEE Transactions on Systems, Man and Cybernetics , 2004
"... Abstract—Visual surveillance in dynamic scenes, especially for humans and vehicles, is currently one of the most active research topics in computer vision. It has a wide spectrum of promising applications, including access control in special areas, human identification at a distance, crowd flux stat ..."
Abstract - Cited by 439 (6 self) - Add to MetaCart
objects, tracking, understanding and description of behaviors, human identification, and fusion of data from multiple cameras. We review recent developments and general strategies of all these stages. Finally, we analyze possible research directions, e.g., occlusion handling, a combination of twoand three

User cooperation diversitypart I: System description

by Andrew Sendonaris, Elza Erkip, Behnaam Aazhang - IEEE Trans. Commun , 2003
"... Abstract—Mobile users ’ data rate and quality of service are limited by the fact that, within the duration of any given call, they experience severe variations in signal attenuation, thereby necessitating the use of some type of diversity. In this two-part paper, we propose a new form of spatial div ..."
Abstract - Cited by 432 (20 self) - Add to MetaCart
to an increase in capacity for both users but also to a more robust system, where users ’ achievable rates are less susceptible to channel variations. Index Terms—Code-division multiple access (CDMA), diversity, fading, information rates, multiuser channels. I.

The design of Postgres

by Michael Stonebraker, Lawrence A. Rowe - In Proceedings of the SIGMOD Conference , 1986
"... This paper presents the preliminary design of a new database management system, called POSTGRES, that is the successor to the INGRES relational database system. The main design goals of the new system are to: 1) provide better support for complex objects, 2) provide user extendibility for data types ..."
Abstract - Cited by 431 (23 self) - Add to MetaCart
of multiple tightly-coupled processors, and custom designed VLSI chips, and 6) make as few changes as possible (preferably none) to the relational model. The paper describes the query language, programming langauge interface, system architecture, query processing strategy, and storage system for the new

Signal design for bandwidth-efficient multiple-access communications based on eigenvalue optimization

by Tommy Guess, Mahesh K. Varanasi, Senior Member - IEEE Trans. Inform. Theory , 2000
"... strategy where transmitter pulses are continually designed at the base station and are dynamically allocated to the transmitters via a feedback channel. Such pulses (or “signature waveforms”) are designed to conserve bandwidth while simultaneously enabling the receiver at the base station to meet a ..."
Abstract - Cited by 8 (4 self) - Add to MetaCart
bandwidth savings over the traditional multiple-access strategies are obtained. However, in contrast to the rank-conserving approach of [1], the bandwidth gains of this paper are realized by tailoring the signature waveform design to conserve rms bandwidth via eigenvalue-optimization problems. Index Terms

Blind Adaptive Multiuser Detection

by Michael Honig, Upamanyu Madhow, Sergio Verdu - IEEE TRANS. INFORM. THEORY , 1995
"... The decorrelating detector and the linear minimum mean-square error (MMSE) detector are known to be effective strategies to counter the presence of multiuser interference in code-division multiple-access channels; in particular, those multiuser detectors provide optimum near-far resistance. When tr ..."
Abstract - Cited by 353 (16 self) - Add to MetaCart
The decorrelating detector and the linear minimum mean-square error (MMSE) detector are known to be effective strategies to counter the presence of multiuser interference in code-division multiple-access channels; in particular, those multiuser detectors provide optimum near-far resistance. When

Cognitive multiple access via cooperation: Protocol design and performance analysis

by Ahmed K. Sadek, K. J. Ray Liu, Anthony Ephremides - IEEE Trans. on Information Theory , 2007
"... Abstract—In this paper, a novel cognitive multiple-access strategy in the presence of a cooperating relay is proposed. Exploiting an important phenomenon in wireless networks, source burstiness, the cognitive relay utilizes the periods of silence of the terminals to enable cooperation. Therefore, no ..."
Abstract - Cited by 77 (24 self) - Add to MetaCart
Abstract—In this paper, a novel cognitive multiple-access strategy in the presence of a cooperating relay is proposed. Exploiting an important phenomenon in wireless networks, source burstiness, the cognitive relay utilizes the periods of silence of the terminals to enable cooperation. Therefore

Capacity theorems for the multiple-access relay channel

by Lalitha Sankaranarayanan, Gerhard Kramer, Narayan B. Mandayam - In Allerton Conference on Communications, Control and Computing , 2004
"... Outer bounds for the discrete memoryless multiple-access relay channel (MARC) are obtained that exploit the causal relationship between the source and relay inputs. A novel offset encoding technique that facilitates window decoding at the destination is presented for a decode-and-forward strategy, w ..."
Abstract - Cited by 52 (3 self) - Add to MetaCart
Outer bounds for the discrete memoryless multiple-access relay channel (MARC) are obtained that exploit the causal relationship between the source and relay inputs. A novel offset encoding technique that facilitates window decoding at the destination is presented for a decode-and-forward strategy

Comparison Of Multi-Cell Multi-Antenna Cdma And Tdma Systems

by Ninoslav Marina Olav, Olav Tirkkonen, Pirjo Pasanen
"... We evaluate system capacities for multicellular systems with different multiple access strategies. The interference from another cell sharing the same frequency is calculated, and the total interference arising from the frequency reuse pattern is evaluated. A simple analytical model for the inter-ce ..."
Abstract - Add to MetaCart
We evaluate system capacities for multicellular systems with different multiple access strategies. The interference from another cell sharing the same frequency is calculated, and the total interference arising from the frequency reuse pattern is evaluated. A simple analytical model for the inter
Next 10 →
Results 1 - 10 of 2,097
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University