• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 89
Next 10 →

On the compound mimo broadcast channel

by Hanan Weingarten, Shlomo Shamai (shitz, Gerhard Kramer , 2007
"... Abstract — We consider the Gaussian multi-antenna compound broadcast channel where one transmitter transmits several mes-sages, each intended for a different user whose channel realization is arbitrarily chosen from a finite set. Our investigation focuses on the behavior of this channel at high SNRs ..."
Abstract - Cited by 50 (3 self) - Add to MetaCart
Abstract — We consider the Gaussian multi-antenna compound broadcast channel where one transmitter transmits several mes-sages, each intended for a different user whose channel realization is arbitrarily chosen from a finite set. Our investigation focuses on the behavior of this channel at high

The Source of Messages Produced During Facilitated Communication with a Boy with Autism and Severe

by Michael Eberlin, Stuart Fbel, John W. Jacobson , 1994
"... Assessed the source of messages produced through facilitated communication with a youth with autism and severe mental retardation using message-passing and picture-naming procedures. Results indicated that the facilitator was the source of the communications produced during the assessment; correct r ..."
Abstract - Add to MetaCart
for ethical practices by professionals in the context of facilitated communications are briefly dis-cussed. KEY WORDS: assessment; augmentative communication; autism; facilitated communication; mes-sage passing; picture naming; severe mental retardation. 'The authors gratefully acknowledge the valuable

Understanding instant messaging traffic characteristics

by Zhen Xiao, Lei Guo, John Tracey - in Distributed Computing Systems, 2007. ICDCS ’07. 27th International Conference on , 2007
"... Instant messaging (IM) has become increasingly popu-lar due to its quick response time, its ease of use, and pos-sibility of multitasking. It is estimated that there are several millions of instant messaging users who use IM for various purposes: simple requests and responses, scheduling face to fac ..."
Abstract - Cited by 26 (1 self) - Add to MetaCart
instant messaging operators with tens of millions of users and dur-ing flash crowd events. Another reason for the lack of previ-ous studies is the difficulty in getting access to instant mes-saging traces due to privacy concerns. In this paper, we analyze the traffic of two popular in-stant messaging

Analysis and computational study of several integer programming formulations for minimum-energy multicasting in wireless ad hoc networks

by Joanna Bauer, Dag Haugland, Di Yuan - NETWORKS
"... A multicast session in a wireless ad hoc network concerns routing mes-sages from a source to a set of destination devices. Transmitting messages consumes energy at the source and intermediate devices of the session. Since a battery is the only energy source in many applications of wireless ad hoc ne ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
A multicast session in a wireless ad hoc network concerns routing mes-sages from a source to a set of destination devices. Transmitting messages consumes energy at the source and intermediate devices of the session. Since a battery is the only energy source in many applications of wireless ad hoc

JXTA Messaging: Analysis of Feature-Performance Tradeoffs

by Emir Halepovic, Ralph Deters, Bernard Traversat , 2005
"... Abstract. With the rise of Peer-to-Peer and Grid infrastructures, there is a re-newed interest in messaging systems. Among the numerous messaging solutions for large loosely coupled distributed environments, the communication and mes-saging system of the JXTA peer-to-peer platform is the richest in ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
Abstract. With the rise of Peer-to-Peer and Grid infrastructures, there is a re-newed interest in messaging systems. Among the numerous messaging solutions for large loosely coupled distributed environments, the communication and mes-saging system of the JXTA peer-to-peer platform is the richest

Background: Operations Enduring Freedom and Iraqi Freedom have resulted

by unknown authors
"... in severe burns to the hands. Because of the frequency and severity of hand burns, an All Army Activity (ALARACT) mes-sage was distributed emphasizing the im-portance of hand protection (HP). Our purpose was to assess the effectiveness of the ALARACT in reducing the incidence and severity of hand bu ..."
Abstract - Add to MetaCart
in severe burns to the hands. Because of the frequency and severity of hand burns, an All Army Activity (ALARACT) mes-sage was distributed emphasizing the im-portance of hand protection (HP). Our purpose was to assess the effectiveness of the ALARACT in reducing the incidence and severity of hand

The Moderating Influence of Advertising Context on Ad Repetition Effects: The Role of Amount and Type of Elaboration

by Prashant Malaviya - Journal of Consumer Research , 2007
"... Although several advertising studies report that message repetition leads to fa-vorable evaluation of the advertised brand, a surprisingly large number of studies fail to find this repetition effect. This article investigates the influence of the ad-vertising context in which the ad is presented on ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
generation of these two types of elaboration of the ad message. When either type of elaboration dominates or when the mes-sage recipient spontaneously generates the impoverished type of elaboration, the effect of ad repetition is not observed. These findings provide evidence for the distinct influence

Synthesis of communication schedules for TTEthernet-based mixed-criticality systems,” CODES+ISSS

by Paul Pop, Wilfried Steiner, Tttech Computertechnik Ag , 2012
"... In this paper we are interested in safety-critical distributed sys-tems, composed of heterogeneous processing elements intercon-nected using the TTEthernet protocol. We address hard real-time mixed-criticality applications, which may have different critical-ity levels, and we focus on the optimizati ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
messages are transmitted based on static schedule tables, and have the highest priority. RC messages are transmitted if there are no TT messages, and BE traffic has the lowest priority. TT and RC traffic can carry safety-critical mes-sages, while BE messages are non-critical. Mixed-criticality tasks

Making distributed spanning tree algorithms fault-resilient

by Reuven Bar-yehuda, Shay Kutten, Yaron Wolfstahl, Shmuel Zaks I - In Proc. Symp. on Theoretical Aspects of Computer Science , 1987
"... We study distributed algorithms for networks with undetectable fail-stop failures, assuming that all of them had occurred before the execution started. (It was proved that distributed agreement cannot be reached when a node may fail during execution.) Failures of this type are encountered, for examp ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
-token algorithms). In fact we are able to use them on several different algorithms, for several different families of networks. Second, following the amortized computational complexity, we introduce amortized message complexity as a tool for analyzing the mes-sage complexity. 1.

Reducing the energy consumption caused by flooding messages in mobile ad hoc networks

by S. Y. Wang - Int’l Journal of Computer and Telecommunications Networking , 2003
"... The message ooding method is an important and useful operation for several applications. However, if a network has a large number of mobile nodes and these nodes use the ood operation often, a mobile node's scarce battery energy will be quickly consumed due to ooding too many messages. In th ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
. In this paper, we propose an approach to reduc-ing the energy consumption caused by ooding mes-sages. The energy saving is achieved by (1) merging several small ood messages into a larger one, and (2) limiting the scope of a ood message. Our simu-lation results show that, at the cost of an increased message
Next 10 →
Results 1 - 10 of 89
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University