Results 1 - 10
of
91
Telecommunication
"... Abstract—In the 2.4 GHz ISM band RF interference is becoming an ever-increasing problem. While there have been several attempts to mitigate the impact of RF interference on (body) sensor networks, e.g. via frequency hopping, it is often unclear how these solutions perform in different interference e ..."
Abstract
- Add to MetaCart
environments and when they are actually useful. This is not least due to a lack of knowledge about the characteristics of environmental 2.4 GHz RF noise as perceived by a BSN in realistic scenarios. Such knowledge would, for example, help to better understand the communication challenges in a BSN and derive
3esis Supervisor Accepted by
, 2005
"... in partial ful2llment of the requirements for the degree of ..."
1Sub-Nyquist Radar via Doppler Focusing
"... Abstract—We investigate the problem of a monostatic pulse-Doppler radar transceiver trying to detect targets, sparsely populated in the radar’s unambiguous time-frequency region. Several past works employ compressed sensing (CS) algorithms to this type of problem, but either do not address sample ra ..."
Abstract
- Add to MetaCart
Abstract—We investigate the problem of a monostatic pulse-Doppler radar transceiver trying to detect targets, sparsely populated in the radar’s unambiguous time-frequency region. Several past works employ compressed sensing (CS) algorithms to this type of problem, but either do not address sample
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
1 A RuleML-Based Ontology for Interoperation between Learning Objects and Learners
"... This paper presents a context mediation based approach for achieving interoperability among semantically heterogeneous learning objects and learners. The presented work is focused on building a common ontology for the domain of learning objects participating in data exchange. An ontological graph is ..."
Abstract
- Add to MetaCart
is proposed as a knowledge representation of the ontology, and methods for manipulating ontologies are presented. The ontological graph is implemented using Rule Markup Language (RuleML), which is a member of XML-based languages. The use of RuleML allows the ontology to flexible, extensible and platform
ACKNOWLEDGMENTS
, 2011
"... First and foremost, I would like to thank my advisor, Prof. Jennifer E. Michaels. I am most appreciative of your guidance over the last four years, from the basics of elastic waves to both short- and long-term career advice. I have grown a tremendous amount, both profes-sionally and personally, and ..."
Abstract
- Add to MetaCart
First and foremost, I would like to thank my advisor, Prof. Jennifer E. Michaels. I am most appreciative of your guidance over the last four years, from the basics of elastic waves to both short- and long-term career advice. I have grown a tremendous amount, both profes-sionally and personally, and am deeply grateful for your mentorship, patience, and support. I would also like to thank my Ph.D. committee for their valuable insight and sugges-
i i
"... , and we can say the Campbell bandwidth is the minimum average bandwidth for en-coding the process across all possible distortion levels. IX. CONCLUSION We have presented two new derivations of the coefficient rate in-troduced by Campbell. One derivation solidifies its interpretation as a coefficien ..."
Abstract
- Add to MetaCart
, and we can say the Campbell bandwidth is the minimum average bandwidth for en-coding the process across all possible distortion levels. IX. CONCLUSION We have presented two new derivations of the coefficient rate in-troduced by Campbell. One derivation solidifies its interpretation as a coefficient rate, and shows that the spectral entropy of a random process is proportional to the logarithm of the equivalent bandwidth of the smallest frequency band that contains most of the energy. The second derivation implies that the number of samples of a particular component should be proportional to the variance of that component. We discussed the implications of the latter result for realization-adap-tive source coding and provided a connection with the familiar reverse water-filling result from rate distortion theory. From the coefficient rate, we defined a quantity called the Campbell bandwidth of a random process, and we contrasted Fourier bandwidth, Shannon bandwidth, and Campbell bandwidth. ACKNOWLEDGMENT The authors are indebted to the referees for their constructive com-ments and insights.
Subspace Communication
, 2014
"... We are surrounded by electronic devices that take advantage of wireless technologies, from our computer mice, which require little amounts of information, to our cellphones, which demand increasingly higher data rates. Until today, the coexistence of such a variety of services has been guaranteed by ..."
Abstract
- Add to MetaCart
degrading the primary systems. Yet in practice, monitoring the spectrum resources, detecting available resources for opportunistic communication, and transmit-ting over the resources are hard tasks. This thesis addresses the tasks of monitoring, de-
DOI 10.1007/s00778-012-0302-x SPECIAL ISSUE PAPER Automating the database schema evolution process
"... Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applicati ..."
Abstract
- Add to MetaCart
Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applications. In addition to labor saving, the ben-efits delivered by these advances are many and include reliable prediction of outcome, minimization of downtime, system-produced documentation, and support for archiving, historical queries, and provenance. The PRISM/PRISM++ system delivers these benefits, by solving the difficult prob-lem of automating the migration of databases and the rewrit-ing of queries and updates. In this paper, we present the PRISM/PRISM++ system and the novel technology that made it possible. In particular, we focus on the difficult and previously unsolved problem of supporting legacy queries and updates under schema and integrity constraints evolution. The PRISM/PRISM++ approach consists in providing the users with a set of SQL-based Schema Modification Opera-tors (SMOs), which describe how the tables in the old schema are modified into those in the new schema. In order to sup-port updates, SMOs are extended with integrity constraints
Results 1 - 10
of
91