Results 1 - 10
of
194
Coil sensitivity encoding for fast MRI. In:
- Proceedings of the ISMRM 6th Annual Meeting,
, 1998
"... New theoretical and practical concepts are presented for considerably enhancing the performance of magnetic resonance imaging (MRI) by means of arrays of multiple receiver coils. Sensitivity encoding (SENSE) is based on the fact that receiver sensitivity generally has an encoding effect complementa ..."
Abstract
-
Cited by 193 (3 self)
- Add to MetaCart
and technical concerns, inherent limits of k-space speed have almost been reached. An entirely different approach to sub-wavelength resolution in MRI is based on the fact that with a receiver placed near the object the contribution of a signal source to the induced voltage varies appreciably with its relative
Distributed contention resolution in wireless networks
- In DISC
, 2010
"... We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric space. Each sender wants to transmit a signal to its receiver at a prespecified power level, e. g., all senders use the s ..."
Abstract
-
Cited by 36 (5 self)
- Add to MetaCart
We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric space. Each sender wants to transmit a signal to its receiver at a prespecified power level, e. g., all senders use
ISRN SICS-D--56--SE Improving Low-Power Wireless Protocols with Timing-Accurate Simulation
, 2011
"... I first thank my thesis advisors Thiemo Voigt and Adam Dunkels for being my excellent advisors, and also for being the great colleagues you still are. Thiemo and Adam have complemented each other superbly, giving me feedback, perspectives, insights, and having made every single new venture truly fun ..."
Abstract
- Add to MetaCart
I first thank my thesis advisors Thiemo Voigt and Adam Dunkels for being my excellent advisors, and also for being the great colleagues you still are. Thiemo and Adam have complemented each other superbly, giving me feedback, perspectives, insights, and having made every single new venture truly fun. My deepest thanks also go to my professor Per Gunningberg, Uppsala University. Per has in a seemingly easy way spotted erroneous assumptions, has valued my research contributions, and has connected my own work with another broader world of research. I want to thank all colleagues in the Networked Embedded Systems group:
Contention Resolution under Selfishness
, 2010
"... In many communications settings, such as wired and wireless local-area networks, when multiple users attempt to access a communication channel at the same time, a conflict results and none of the communications are successful. Contention resolution is the study of distributed transmission and retran ..."
Abstract
- Add to MetaCart
In many communications settings, such as wired and wireless local-area networks, when multiple users attempt to access a communication channel at the same time, a conflict results and none of the communications are successful. Contention resolution is the study of distributed transmission
Contention Resolution in Hashing Based Shared Memory Simulations
, 2000
"... In this paper we study the problem of simulating shared memory on the distributed memory machine (DMM). Our approach uses multiple copies of shared memory cells, distributed among the memory modules of the DMM via universal hashing. The main aim is to design strategies that resolve contention at th ..."
Abstract
-
Cited by 11 (3 self)
- Add to MetaCart
In this paper we study the problem of simulating shared memory on the distributed memory machine (DMM). Our approach uses multiple copies of shared memory cells, distributed among the memory modules of the DMM via universal hashing. The main aim is to design strategies that resolve contention
Brief Announcement: Distributed Contention Resolution in Wireless Networks ∗ ABSTRACT
"... We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric space. Each sender wants to transmit a signal to its receiver at a prespecified power level, e.g., all senders use the sa ..."
Abstract
- Add to MetaCart
We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric space. Each sender wants to transmit a signal to its receiver at a prespecified power level, e.g., all senders use
Combining Optimal Clustering and Hidden Markov Models for Extractive Summarization
, 2003
"... We propose Hidden Markov models with unsupervised training for extractive summarization. Extractive summarization selects salient sentences from documents to be included in a summary. Unsupervised clustering combined with heuristics is a popular approach because no annotated data is required. Howev ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
framework. Clustering is done by modified K-means (MKM)--a method that yields more optimal clusters than the conventional K-means method. Text cohesion is modeled by the transition probabilities of an HMM, and term distribution is modeled by the emission probabilities. The final decoding process tags
Rewritable Storage Channels with Hidden State
"... Abstract-Many storage channels admit reading and rewriting of the content at a given cost. We consider rewritable channels with a hidden state which models the unknown characteristics of the memory cell. In addition to mitigating the effect of write noise, rewrites can help the write controller obt ..."
Abstract
- Add to MetaCart
AWGN channel is discussed as an example. The second contribution is a simple coding scheme for a rewritable channel where the write noise and hidden state are both uniformly distributed. It is shown that this scheme is asymptotically optimal as the number of rewrites gets large.
Rewritable Storage Channels with Hidden State
"... Abstract—Many storage channels admit reading and rewriting of the content at a given cost. We consider rewritable channels with a hidden state which models the unknown characteristics of the memory cell. In addition to mitigating the effect of the write noise, rewrites can help the write controller ..."
Abstract
- Add to MetaCart
AWGN channel is discussed as an example. The second contribution is a simple coding scheme for a rewritable channel where the write noise and hidden state are both uniformly distributed. It is shown that this scheme is asymptotically optimal as the number of rewrites gets large. I.
Mobile Content Distribution for Wireless IP Networks
"... Future wireless IP networks will scale to millions of heterogeneous terminals and provide seamless and ubiquitous content services. However, wireless networks and terminals have drastically different characteristics than their wireline counterparts in terms of bandwidth availability, mobility, proce ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
overcoming these difficulties must be developed. In this paper, we develop taxonomy of content distribution techniques that consists of network scaling, endpoint acceleration and protocol and content optimization. We review existing wireline content distribution techniques that will be useful in wireless
Results 1 - 10
of
194