• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 14,617
Next 10 →

The capacity of wireless networks

by Piyush Gupta, P. R. Kumar - IEEE TRANSACTIONS ON INFORMATION THEORY , 2000
"... When n identical randomly located nodes, each capable of transmitting at bits per second and using a fixed range, form a wireless network, the throughput @ A obtainable by each node for a randomly chosen destination is 2 bits per second under a noninterference protocol. If the nodes are optimally p ..."
Abstract - Cited by 3243 (42 self) - Add to MetaCart
second for each node for a destination nonvanishingly far away. Similar results also hold under an alternate physical model where a required signal-to-interference ratio is specified for successful receptions. Fundamentally, it is the need for every node all over the domain to share whatever portion

Methods of Capacity Needs Assessment – A Discussion Note

by Suresh C. Babu, Shashidhara Kolavalli, Discussion Note
"... apacity strengthening programs often do not achieve their intended objectives due to poor targeting of the participants and mismatch between the capacity needs and the ..."
Abstract - Add to MetaCart
apacity strengthening programs often do not achieve their intended objectives due to poor targeting of the participants and mismatch between the capacity needs and the

On limits of wireless communications in a fading environment when using multiple antennas

by G. J. Foschini, M. J. Gans - Wireless Personal Communications , 1998
"... Abstract. This paper is motivated by the need for fundamental understanding of ultimate limits of bandwidth efficient delivery of higher bit-rates in digital wireless communications and to also begin to look into how these limits might be approached. We examine exploitation of multi-element array (M ..."
Abstract - Cited by 2426 (14 self) - Add to MetaCart
Abstract. This paper is motivated by the need for fundamental understanding of ultimate limits of bandwidth efficient delivery of higher bit-rates in digital wireless communications and to also begin to look into how these limits might be approached. We examine exploitation of multi-element array

Energy Conserving Routing in Wireless Ad-hoc Networks

by Jae-hwan Chang, Leandros Tassiulas , 2000
"... An ad-hoc network of wireless static nodes is considered as it arises in a rapidly deployed, sensor based, monitoring system. Information is generated in certain nodes and needs to reach a set of designated gateway nodes. Each node may adjust its power within a certain range that determines the set ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
An ad-hoc network of wireless static nodes is considered as it arises in a rapidly deployed, sensor based, monitoring system. Information is generated in certain nodes and needs to reach a set of designated gateway nodes. Each node may adjust its power within a certain range that determines

Temperature-aware microarchitecture

by Kevin Skadron, Mircea R. Stan, Wei Huang, Sivakumar Velusamy, Karthik Sankaranarayanan, David Tarjan - In Proceedings of the 30th Annual International Symposium on Computer Architecture , 2003
"... With power density and hence cooling costs rising exponentially, processor packaging can no longer be designed for the worst case, and there is an urgent need for runtime processor-level techniques that can regulate operating temperature when the package’s capacity is exceeded. Evaluating such techn ..."
Abstract - Cited by 478 (52 self) - Add to MetaCart
With power density and hence cooling costs rising exponentially, processor packaging can no longer be designed for the worst case, and there is an urgent need for runtime processor-level techniques that can regulate operating temperature when the package’s capacity is exceeded. Evaluating

Practical Network Coding

by Philip A. Chou, Yunnan Wu, Kamal Jain , 2003
"... We propose a distributed scheme for practical network coding that obviates the need for centralized knowledge of the graph topology, the encoding functions, and the decoding functions, and furthermore obviates the need for information to be communicated synchronously through the network. The resu ..."
Abstract - Cited by 462 (15 self) - Add to MetaCart
We propose a distributed scheme for practical network coding that obviates the need for centralized knowledge of the graph topology, the encoding functions, and the decoding functions, and furthermore obviates the need for information to be communicated synchronously through the network

Power provisioning for a warehousesized computer,”

by Xiaobo Fan , Wolf-Dietrich Weber Luiz , André Barroso - ACM SIGARCH Computer Architecture News, , 2007
"... ABSTRACT Large-scale Internet services require a computing infrastructure that can be appropriately described as a warehouse-sized computing system. The cost of building datacenter facilities capable of delivering a given power capacity to such a computer can rival the recurring energy consumption ..."
Abstract - Cited by 450 (2 self) - Add to MetaCart
ABSTRACT Large-scale Internet services require a computing infrastructure that can be appropriately described as a warehouse-sized computing system. The cost of building datacenter facilities capable of delivering a given power capacity to such a computer can rival the recurring energy consumption

Implementation issues in spectrum sensing for cognitive radios

by Danijela Cabric, Shridhar Mubaraq Mishra, Robert W. Brodersen - in Proc. the 38th. Asilomar Conference on Signals, Systems, and Computers , 2004
"... Abstract- There are new system implementation challenges involved in the design of cognitive radios, which have both the ability to sense the spectral environment and the flexibility to adapt transmission parameters to maximize system capacity while co-existing with legacy wireless networks. The cri ..."
Abstract - Cited by 440 (7 self) - Add to MetaCart
Abstract- There are new system implementation challenges involved in the design of cognitive radios, which have both the ability to sense the spectral environment and the flexibility to adapt transmission parameters to maximize system capacity while co-existing with legacy wireless networks

A Vector-Perturbation technique for Near-Capacity . . .

by Christian B. Peel, Bertrand M. Hochwald, A. Lee Swindlehurst - IEEE TRANS. COMMUN , 2005
"... Recent theoretical results describing the sum capacity when using multiple antennas to communicate with multiple users in a known rich scattering environment have not yet been followed with practical transmission schemes that achieve this capacity. We introduce a simple encoding algorithm that achi ..."
Abstract - Cited by 323 (10 self) - Add to MetaCart
and maximize the signal-to-interference-plus-noise ratio at the receivers. Regularization enables linear growth and works especially well at low signal-to-noise ratios (SNRs), but as we show in the second part, an additional step is needed to achieve near-capacity performance at all SNRs.

A GUIDE FOR SELF-ASSESSMENT OF COUNTRY CAPACITY NEEDS FOR GLOBAL ENVIRONMENTAL MANAGEMENT

by unknown authors , 2001
"... undertake self assessments of capacity building needs. For this purpose, it invited “the GEF Secretariat, in collaboration with the Implementing Agencies and the Executing Agencies, to prepare and widely disseminate guidelines to assist countries to prepare project proposals for such assistance.” 2. ..."
Abstract - Add to MetaCart
undertake self assessments of capacity building needs. For this purpose, it invited “the GEF Secretariat, in collaboration with the Implementing Agencies and the Executing Agencies, to prepare and widely disseminate guidelines to assist countries to prepare project proposals for such assistance.” 2
Next 10 →
Results 1 - 10 of 14,617
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University