Results 1 - 10
of
128
Self-determination and persistence in a real-life setting: Toward a motivational model of high school dropout.
- Journal of Personality and Social Psychology,
, 1997
"... The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive the so ..."
Abstract
-
Cited by 183 (19 self)
- Add to MetaCart
reverse scoring), and finally, the School Administration Autonomy Support Scale (e.g., "The school administration generally consults students before introducing new school policies'') had Cronbach alphas of .54, .56, and .65, respectively. 2 Participants rated items on a 7-point Likert
Managing shared access to a spectrum commons
- in IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN’05
, 2005
"... * * draft ** Abstract- The open access, unlicensed or spectrum commons approach to managing shared access to RF spectrum offers many attractive benefits, especially when implemented in conjunction with and as a complement to a regime of marketbased, flexible use, tradable licensed spectrum ([Benkler ..."
Abstract
-
Cited by 48 (0 self)
- Add to MetaCart
that suggests a set of design principles for the protocols that will govern a successful commons management regime. Our design rules lead us to conclude that the appropriate Protocols for a Commons will need to be more liquid ([Reed05]) than in the past: (1) Marketbased instead of C&C; (2) Decentralized
Wireless Sensor Networking in Challenging Environments
, 2014
"... This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact ..."
Abstract
- Add to MetaCart
This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
Peak Power and Interference Outage Probability Constrained Optimal Transmission Policy for Underlay Cognitive Radios
"... Abstract—In an underlay cognitive radio (CR) system, a secondary user (SU) can transmit even when the primary is on but under stringent constraints on the interference that it causes at the primary receiver (PRx). The interference constraint fundamentally influences and changes how the SU transmits. ..."
Abstract
- Add to MetaCart
. We develop a novel and optimal transmit power policy for an SU that minimizes its symbol error probability (SEP) when it is subject to two practically motivated constraints, namely, a peak transmit power constraint and an interference outage probability constraint. We derive new expressions
doi:10.1155/2012/826702 Research Article Exploiting the Burstiness of Intermediate-Quality Wireless Links
"... Copyright © 2012 Muhammad Hamad Alizai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We address the challenge of link estima ..."
Abstract
- Add to MetaCart
transmissions (EFT) and MAC3, for runtime estimation of bursty wireless links.We introduce a bursty link estimator (BLE) that based on these twometrics, accurately estimates bursty links in the network rendering them available for data transmissions. Finally, we present bursty routing extensions (BRE
Subspace Communication
, 2014
"... We are surrounded by electronic devices that take advantage of wireless technologies, from our computer mice, which require little amounts of information, to our cellphones, which demand increasingly higher data rates. Until today, the coexistence of such a variety of services has been guaranteed by ..."
Abstract
- Add to MetaCart
by a fixed assignment of spectrum resources by regulatory agencies. This has resulted into a blind alley, as current wireless spectrum has become an expensive and a scarce resource. However, recent measurements in dense areas paint a very different picture: there is an actual underutilization
1Sub-Nyquist Sampling for Power Spectrum Sensing in Cognitive Radios: A Unified Approach
"... Abstract—In light of the ever-increasing demand for new spectral bands and the underutilization of those already allocated, the concept of Cognitive Radio (CR) has emerged. Opportunistic users could exploit temporarily vacant bands after detecting the absence of activity of their owners. One of the ..."
Abstract
- Add to MetaCart
of the crucial tasks in the CR cycle is therefore spectrum sensing and detection which has to be precise and efficient. Yet, CRs typically deal with wideband signals whose Nyquist rates are very high. In this paper, we propose to reconstruct the power spectrum of such signals from sub-Nyquist samples, rather
References: See Enclosure B JOINT SPECTRUM INTERFERENCE RESOLUTION
, 2013
"... identify the roles and responsibilities of DoD agencies; and provide security classification guidance for the Joint Spectrum Interference Resolution (JSIR) program. 2. Cancellation. CJCSI 3320.02E, 15 October 2010, is canceled. 3. Applicability. This instruction is applicable to the DoD Combatant Co ..."
Abstract
- Add to MetaCart
Commands, Services, and agencies (C/S/As), to include joint task forces (JTFs), U.S. elements of combined commands, and DoD elements of the intelligence community. C/S/As will develop procedures for implementing this manual. 4. Policy. Applicable organizations and commands described above are to follow
Self-Stabilizing TDMA Algorithms for Dynamic Wireless Ad-hoc Networks ∗
"... In dynamic wireless ad-hoc networks (DynWANs), autonomous computing devices set up a network for the communication needs of the moment. These networks require the implementation of a medium access control (MAC) layer. We consider MAC protocols for DynWANs that need to be autonomous and robust as wel ..."
Abstract
- Add to MetaCart
In dynamic wireless ad-hoc networks (DynWANs), autonomous computing devices set up a network for the communication needs of the moment. These networks require the implementation of a medium access control (MAC) layer. We consider MAC protocols for DynWANs that need to be autonomous and robust
Results 1 - 10
of
128