• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,826
Next 10 →

Fading Channels: Information-Theoretic And Communications Aspects

by Ezio Biglieri, John Proakis, Shlomo Shamai (Shitz) - IEEE TRANSACTIONS ON INFORMATION THEORY , 1998
"... In this paper we review the most peculiar and interesting information-theoretic and communications features of fading channels. We first describe the statistical models of fading channels which are frequently used in the analysis and design of communication systems. Next, we focus on the information ..."
Abstract - Cited by 426 (3 self) - Add to MetaCart
In this paper we review the most peculiar and interesting information-theoretic and communications features of fading channels. We first describe the statistical models of fading channels which are frequently used in the analysis and design of communication systems. Next, we focus

Software agents: An overview

by Hyacinth S. Nwana - Knowledge Engineering Review , 1996
"... Agent software is a rapidly developing area of research. However, the overuse of the word ‘agent ’ has tended to mask the fact that, in reality, there is a truly heterogeneous body of research being carried out under this banner. This overview paper presents a typology of agents. Next, it places age ..."
Abstract - Cited by 418 (5 self) - Add to MetaCart
Agent software is a rapidly developing area of research. However, the overuse of the word ‘agent ’ has tended to mask the fact that, in reality, there is a truly heterogeneous body of research being carried out under this banner. This overview paper presents a typology of agents. Next, it places

Routing in Ad Hoc Networks of Mobile Hosts

by David B. Johnson - Proceedings of the Workshop on Mobile Computing Systems and Applications, IEEE Computer Society , 1581
"... An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. In such an environment, it may be necessary for one mobile host to enlist the aid of others in forwarding a packet to its destination ..."
Abstract - Cited by 308 (18 self) - Add to MetaCart
destination, due to the limitedpropagation range of each mobile host’s wireless transmissions. Some previous attempts have been made to use conventional routing protocols for routing in ad hoc networks, treating each mobile host as a router This position paper points out a number of problems with this design

A Quasi-orthogonal Space–time Block Code

by Hamid Jafarkhani , 2001
"... It has been shown that a complex orthogonal design that provides full diversity and full transmission rate for a space–time block code is not possible for more than two antennas. Previous attempts have been concentrated in generalizing orthogonal designs which provide space–time block codes with ful ..."
Abstract - Cited by 301 (12 self) - Add to MetaCart
It has been shown that a complex orthogonal design that provides full diversity and full transmission rate for a space–time block code is not possible for more than two antennas. Previous attempts have been concentrated in generalizing orthogonal designs which provide space–time block codes

Power-Aware Localized Routing in Wireless Networks

by Ivan Stojmenovic, Xu Lin , 2000
"... Recently, a cost aware metric for wireless networks based on remaining battery power at nodes was proposed for shortest-cost routing algorithms, assuming constant transmission power. Power aware metrics where transmission power depends on distance between nodes, and corresponding shortest-power algo ..."
Abstract - Cited by 298 (33 self) - Add to MetaCart
Recently, a cost aware metric for wireless networks based on remaining battery power at nodes was proposed for shortest-cost routing algorithms, assuming constant transmission power. Power aware metrics where transmission power depends on distance between nodes, and corresponding shortest

The New Routing Algorithm for the ARPANET

by John M. McQuillan, Ira Richer, Eric C. Rosen - IEEE TRANSACTIONS ON COMMUNICATIONS , 1980
"... The new ARPANET routing algorithm is an improvement test results. This paper is a summary of our conclusions only; over the old procedure in that it uses fewer network resources, operates on for more complete descriptions of our research findings, see more realistic estimates of network conditions, ..."
Abstract - Cited by 300 (2 self) - Add to MetaCart
and the delays on all lines, and uses the database describing the network to generate a tree representing the me original ARPANET routing algorithm and the new verminimum delay paths from a given root node to every other network node. sion both attempt to route packets along paths of least delay. Because

The amygdala: vigilance and emotion

by M Davis, P J Whalen - MOLECULAR PSYCHIATRY , 2001
"... Here we provide a review of the animal and human literature concerning the role of the amygdala in fear conditioning, considering its potential influence over autonomic and hormonal changes, motor behavior and attentional processes. A stimulus that predicts an aversive outcome will change neural tra ..."
Abstract - Cited by 291 (0 self) - Add to MetaCart
transmission in the amygdala to produce the somatic, autonomic and endocrine signs of fear, as well as increased attention to that stimulus. It is now clear that the amygdala is also involved in learning about positively valenced stimuli as well as spatial and motor learning and this review strives

Applications of Error-Control Coding

by Daniel J. Costello, Jr., Joachim Hagenauer, Hideki Imai, Stephen B. Wicker , 1998
"... An overview of the many practical applications of channel coding theory in the past 50 years is presented. The following application areas are included: deep space communication, satellite communication, data transmission, data storage, mobile communication, file transfer, and digital audio/video t ..."
Abstract - Cited by 276 (0 self) - Add to MetaCart
/video transmission. Examples, both historical and current, are given that typify the different approaches used in each application area. Although no attempt is made to be comprehensive in our coverage, the examples chosen clearly illustrate the richness, variety, and importance of error-control coding methods

Developments in the Measurement of Subjective Well-Being

by Daniel Kahneman , Alan B Krueger - Psychological Science. , 1993
"... F or good reasons, economists have had a long-standing preference for studying peoples' revealed preferences; that is, looking at individuals' actual choices and decisions rather than their stated intentions or subjective reports of likes and dislikes. Yet people often make choices that b ..."
Abstract - Cited by 284 (7 self) - Add to MetaCart
." Journal of Economic Perspectives defined the happiness of an individual during a period of time as the sum of the momentary utilities over that time period; that is, the temporal integral of momentary utility. Several methods have been used to attempt to measure the moment-tomoment flow of pleasure

Information-theoretic analysis of information hiding

by Pierre Moulin, Joseph A. O’sullivan - IEEE Transactions on Information Theory , 2003
"... Abstract—An information-theoretic analysis of information hiding is presented in this paper, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermar ..."
Abstract - Cited by 265 (19 self) - Add to MetaCart
, watermarking, fingerprinting, steganography, and data embedding. In these applications, information is hidden within a host data set and is to be reliably communicated to a receiver. The host data set is intentionally corrupted, but in a covert way, designed to be imperceptible to a casual analysis. Next
Next 10 →
Results 1 - 10 of 7,826
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University