Results 1 - 10
of
2,097
A Framework for Quality of Service with a Multiple Access Strategy
"... Abstract—We study a problem of scheduling real-time traffic with hard delay constraints in an unreliable wireless channel. Packets arrive at a constant rate to the network and have to be delivered within a fixed number of slots in a fading wireless channel. For an infrastructure mode of traffic with ..."
Abstract
- Add to MetaCart
vectors with the multiple access technique and study throughput optimal and utility maximizing strategies for the network scenario. Using simulations, we evaluate the performance of the proposed strategy and discuss its advantages. I.
Computation over Multiple-Access Channels
- IEEE TRANSACTIONS ON INFORMATION THEORY
, 2007
"... The problem of reliably reconstructing a function of sources over a multiple-access channel is considered. It is shown that there is no source-channel separation theorem even when the individual sources are independent. Joint sourcechannel strategies are developed that are optimal when the structure ..."
Abstract
-
Cited by 139 (24 self)
- Add to MetaCart
The problem of reliably reconstructing a function of sources over a multiple-access channel is considered. It is shown that there is no source-channel separation theorem even when the individual sources are independent. Joint sourcechannel strategies are developed that are optimal when
A survey on visual surveillance of object motion and behaviors
- IEEE Transactions on Systems, Man and Cybernetics
, 2004
"... Abstract—Visual surveillance in dynamic scenes, especially for humans and vehicles, is currently one of the most active research topics in computer vision. It has a wide spectrum of promising applications, including access control in special areas, human identification at a distance, crowd flux stat ..."
Abstract
-
Cited by 439 (6 self)
- Add to MetaCart
objects, tracking, understanding and description of behaviors, human identification, and fusion of data from multiple cameras. We review recent developments and general strategies of all these stages. Finally, we analyze possible research directions, e.g., occlusion handling, a combination of twoand three
User cooperation diversitypart I: System description
- IEEE Trans. Commun
, 2003
"... Abstract—Mobile users ’ data rate and quality of service are limited by the fact that, within the duration of any given call, they experience severe variations in signal attenuation, thereby necessitating the use of some type of diversity. In this two-part paper, we propose a new form of spatial div ..."
Abstract
-
Cited by 432 (20 self)
- Add to MetaCart
to an increase in capacity for both users but also to a more robust system, where users ’ achievable rates are less susceptible to channel variations. Index Terms—Code-division multiple access (CDMA), diversity, fading, information rates, multiuser channels. I.
The design of Postgres
- In Proceedings of the SIGMOD Conference
, 1986
"... This paper presents the preliminary design of a new database management system, called POSTGRES, that is the successor to the INGRES relational database system. The main design goals of the new system are to: 1) provide better support for complex objects, 2) provide user extendibility for data types ..."
Abstract
-
Cited by 431 (23 self)
- Add to MetaCart
of multiple tightly-coupled processors, and custom designed VLSI chips, and 6) make as few changes as possible (preferably none) to the relational model. The paper describes the query language, programming langauge interface, system architecture, query processing strategy, and storage system for the new
Signal design for bandwidth-efficient multiple-access communications based on eigenvalue optimization
- IEEE Trans. Inform. Theory
, 2000
"... strategy where transmitter pulses are continually designed at the base station and are dynamically allocated to the transmitters via a feedback channel. Such pulses (or “signature waveforms”) are designed to conserve bandwidth while simultaneously enabling the receiver at the base station to meet a ..."
Abstract
-
Cited by 8 (4 self)
- Add to MetaCart
bandwidth savings over the traditional multiple-access strategies are obtained. However, in contrast to the rank-conserving approach of [1], the bandwidth gains of this paper are realized by tailoring the signature waveform design to conserve rms bandwidth via eigenvalue-optimization problems. Index Terms
Blind Adaptive Multiuser Detection
- IEEE TRANS. INFORM. THEORY
, 1995
"... The decorrelating detector and the linear minimum mean-square error (MMSE) detector are known to be effective strategies to counter the presence of multiuser interference in code-division multiple-access channels; in particular, those multiuser detectors provide optimum near-far resistance. When tr ..."
Abstract
-
Cited by 353 (16 self)
- Add to MetaCart
The decorrelating detector and the linear minimum mean-square error (MMSE) detector are known to be effective strategies to counter the presence of multiuser interference in code-division multiple-access channels; in particular, those multiuser detectors provide optimum near-far resistance. When
Cognitive multiple access via cooperation: Protocol design and performance analysis
- IEEE Trans. on Information Theory
, 2007
"... Abstract—In this paper, a novel cognitive multiple-access strategy in the presence of a cooperating relay is proposed. Exploiting an important phenomenon in wireless networks, source burstiness, the cognitive relay utilizes the periods of silence of the terminals to enable cooperation. Therefore, no ..."
Abstract
-
Cited by 77 (24 self)
- Add to MetaCart
Abstract—In this paper, a novel cognitive multiple-access strategy in the presence of a cooperating relay is proposed. Exploiting an important phenomenon in wireless networks, source burstiness, the cognitive relay utilizes the periods of silence of the terminals to enable cooperation. Therefore
Capacity theorems for the multiple-access relay channel
- In Allerton Conference on Communications, Control and Computing
, 2004
"... Outer bounds for the discrete memoryless multiple-access relay channel (MARC) are obtained that exploit the causal relationship between the source and relay inputs. A novel offset encoding technique that facilitates window decoding at the destination is presented for a decode-and-forward strategy, w ..."
Abstract
-
Cited by 52 (3 self)
- Add to MetaCart
Outer bounds for the discrete memoryless multiple-access relay channel (MARC) are obtained that exploit the causal relationship between the source and relay inputs. A novel offset encoding technique that facilitates window decoding at the destination is presented for a decode-and-forward strategy
Comparison Of Multi-Cell Multi-Antenna Cdma And Tdma Systems
"... We evaluate system capacities for multicellular systems with different multiple access strategies. The interference from another cell sharing the same frequency is calculated, and the total interference arising from the frequency reuse pattern is evaluated. A simple analytical model for the inter-ce ..."
Abstract
- Add to MetaCart
We evaluate system capacities for multicellular systems with different multiple access strategies. The interference from another cell sharing the same frequency is calculated, and the total interference arising from the frequency reuse pattern is evaluated. A simple analytical model for the inter
Results 1 - 10
of
2,097