Results 1 - 10
of
4,072,171
NeXt generation/dynamic spectrum access/cognitive Radio Wireless Networks: A Survey
- COMPUTER NETWORKS JOURNAL (ELSEVIER
, 2006
"... Today's wireless networks are characterized by a fixed spectrum assignment policy. However, a large portion of the assigned spectrum is used sporadically and geographical variations in the utilization of assigned spectrum ranges from 15% to 85% with a high variance in time. The limited availabl ..."
Abstract
-
Cited by 708 (16 self)
- Add to MetaCart
Today's wireless networks are characterized by a fixed spectrum assignment policy. However, a large portion of the assigned spectrum is used sporadically and geographical variations in the utilization of assigned spectrum ranges from 15% to 85% with a high variance in time. The limited
Spectrum Auctions
, 2001
"... Auctions have emerged as the primary means of assigning spectrum licenses to companies wishing to provide wireless communication services. Since July 1994, the Federal Communications Commission (FCC) has conducted 33 spectrum auctions, assigning thousands of licenses to hundreds of firms. Countries ..."
Abstract
-
Cited by 450 (20 self)
- Add to MetaCart
Auctions have emerged as the primary means of assigning spectrum licenses to companies wishing to provide wireless communication services. Since July 1994, the Federal Communications Commission (FCC) has conducted 33 spectrum auctions, assigning thousands of licenses to hundreds of firms. Countries
Secure spread spectrum watermarking for multimedia
- IEEE TRANSACTIONS ON IMAGE PROCESSING
, 1997
"... This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gauss ..."
Abstract
-
Cited by 1076 (10 self)
- Add to MetaCart
.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression
Spectrum estimation and harmonic analysis
, 1982
"... Abstmct-In the choice of an eduutor for the spectnrm of a ation- ..."
Abstract
-
Cited by 438 (3 self)
- Add to MetaCart
Abstmct-In the choice of an eduutor for the spectnrm of a ation-
The large N limit of superconformal field theories and supergravity
, 1998
"... We show that the large N limit of certain conformal field theories in various dimensions include in their Hilbert space a sector describing supergravity on the product of AntideSitter spacetimes, spheres and other compact manifolds. This is shown by taking some branes in the full M/string theory and ..."
Abstract
-
Cited by 5673 (21 self)
- Add to MetaCart
We show that the large N limit of certain conformal field theories in various dimensions include in their Hilbert space a sector describing supergravity on the product of AntideSitter spacetimes, spheres and other compact manifolds. This is shown by taking some branes in the full M/string theory
A Limited Memory Algorithm for Bound Constrained Optimization
- SIAM Journal on Scientific Computing
, 1994
"... An algorithm for solving large nonlinear optimization problems with simple bounds is described. ..."
Abstract
-
Cited by 557 (9 self)
- Add to MetaCart
An algorithm for solving large nonlinear optimization problems with simple bounds is described.
On limits of wireless communications in a fading environment when using multiple antennas
- Wireless Personal Communications
, 1998
"... Abstract. This paper is motivated by the need for fundamental understanding of ultimate limits of bandwidth efficient delivery of higher bit-rates in digital wireless communications and to also begin to look into how these limits might be approached. We examine exploitation of multi-element array (M ..."
Abstract
-
Cited by 2363 (14 self)
- Add to MetaCart
Abstract. This paper is motivated by the need for fundamental understanding of ultimate limits of bandwidth efficient delivery of higher bit-rates in digital wireless communications and to also begin to look into how these limits might be approached. We examine exploitation of multi-element array
Adolescence-limited and life-course-persistent antisocial behavior: Adevelopmental taxonomy
- Psychological Review
, 1993
"... A dual taxonomy is presented to reconcile 2 incongruous facts about antisocial behavior: (a) It shows impressive continuity over age, but (b) its prevalence changes dramatically over age, increasing almost 10-fold temporarily during adolescence. This article suggests that delinquency conceals 2 dist ..."
Abstract
-
Cited by 549 (4 self)
- Add to MetaCart
, children's neuropsychological problems interact cumulatively with their criminogenic environments across development, culminating in a pathological personality. According to the theory of adolescence-limited antisocial behavior, a contemporary maturity gap encourages teens to mimic antisocial behavior
Relational Databases for Querying XML Documents: Limitations and Opportunities
, 1999
"... XML is fast emerging as the dominant standard for representing data in the World Wide Web. Sophisticated query engines that allow users to effectively tap the data stored in XML documents will be crucial to exploiting the full power of XML. While there has been a great deal of activity recently prop ..."
Abstract
-
Cited by 490 (9 self)
- Add to MetaCart
that the relational approach can handle most (but not all) of the semantics of semi-structured queries over XML data, but is likely to be effective only in some cases. We identify the causes for these limitations and propose certain extensions to the relational
Results 1 - 10
of
4,072,171