Results 1 - 10
of
2,640
Bit and Power Allocation in Constrained Multicarrier Systems: The Single-User Case
, 2008
"... Multicarrier modulation is a powerful transmission technique that provides improved performance in various communication fields. A fundamental topic of multicarrier communication systems is the bit and power loading, which is addressed in this article as a constrained multivariable nonlinear optimiz ..."
Abstract
-
Cited by 17 (0 self)
- Add to MetaCart
optimization problem. In particular, we present the main classes of loading problems, namely, rate maximization and margin maximization, and we discuss their optimal solutions for the single-user case. Initially, the classical water-filling solution subject to a total power constraint is presented using
A generalized processor sharing approach to flow control in integrated services networks: The single-node case
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 1993
"... The problem of allocating network resources to the users of an integrated services network is investigated in the context of rate-based flow control. The network is assumed to be a virtual circuit, connection-based packet network. We show that the use of Generalized processor Sharing (GPS), when co ..."
Abstract
-
Cited by 2010 (5 self)
- Add to MetaCart
combined with Leaky Bucket admission control, allows the network to make a wide range of worst-case performance guarantees on throughput and delay. The scheme is flexible in that different users may be given widely different performance guarantees, and is efficient in that each of the servers is work
The Vocabulary Problem in Human-System Communication
- COMMUNICATIONS OF THE ACM
, 1987
"... In almost all computer applications, users must enter correct words for the desired objects or actions. For success without extensive training, or in first-tries for new targets, the system must recognize terms that will be chosen spontaneously. We studied spontaneous word choice for objects in five ..."
Abstract
-
Cited by 562 (8 self)
- Add to MetaCart
In almost all computer applications, users must enter correct words for the desired objects or actions. For success without extensive training, or in first-tries for new targets, the system must recognize terms that will be chosen spontaneously. We studied spontaneous word choice for objects
Multiobjective Optimization Using Nondominated Sorting in Genetic Algorithms
- Evolutionary Computation
, 1994
"... In trying to solve multiobjective optimization problems, many traditional methods scalarize the objective vector into a single objective. In those cases, the obtained solution is highly sensitive to the weight vector used in the scalarization process and demands the user to have knowledge about t ..."
Abstract
-
Cited by 539 (5 self)
- Add to MetaCart
In trying to solve multiobjective optimization problems, many traditional methods scalarize the objective vector into a single objective. In those cases, the obtained solution is highly sensitive to the weight vector used in the scalarization process and demands the user to have knowledge about
Cooperative strategies and capacity theorems for relay networks
- IEEE TRANS. INFORM. THEORY
, 2005
"... Coding strategies that exploit node cooperation are developed for relay networks. Two basic schemes are studied: the relays decode-and-forward the source message to the destination, or they compress-and-forward their channel outputs to the destination. The decode-and-forward scheme is a variant of ..."
Abstract
-
Cited by 739 (19 self)
- Add to MetaCart
with the rate of a distributed antenna array with full cooperation even though the transmitting antennas are not colocated. The capacity results generalize broadly, including to multiantenna transmission with Rayleigh fading, single-bounce fading, certain quasi-static fading problems, cases where partial
Calibrating noise to sensitivity in private data analysis
- In Proceedings of the 3rd Theory of Cryptography Conference
, 2006
"... Abstract. We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that holds a database of sensitive information. Given a query function f mapping databases to reals, the so-called true answer is the result of applying f to the datab ..."
Abstract
-
Cited by 649 (60 self)
- Add to MetaCart
to the database. To protect privacy, the true answer is perturbed by the addition of random noise generated according to a carefully chosen distribution, and this response, the true answer plus noise, is returned to the user. Previous work focused on the case of noisy sums, in which f =P i g(xi), where xi denotes
Linear multiuser detectors for synchronous code-division multiple-access channels
- IEEE TRANS. INFORM. THEORY
, 1989
"... In code-division multiple-access systems, simultaneous mul-tiuser accessing of a common channel is made possible by assigning a signature waveform to each user. Knowledge of these waveforms enables the receiver to demodulate the data streams of each user, upon observation of the sum of the transmitt ..."
Abstract
-
Cited by 385 (4 self)
- Add to MetaCart
in a near-far environment where the received energies of the users are not necessarily similar. Optimum multiuser detection achieves important performance gains over conven-tional single-user detection at the expense of computational complexity that grows exponentially with the number of users
The Table Lens: Merging Graphical and Symbolic Representations in an Interactive Focus+Context Visualization for Tabular Information
, 1994
"... We present a new visualization, called the Table Lens, for visualizing and making sense of large tables. The visualization uses a focus context (fisheye) technique that works effectively on tabular information because it allows display of crucial label information and multiple distal focal areas. In ..."
Abstract
-
Cited by 396 (3 self)
- Add to MetaCart
. In addition, a graphical mapping scheme for depicting table contents has been developed for the most widespread kind of tables, the cases-by-variables table. The Table Lens fuses symbolic and graphical representations into a single coherent view that can be fluidly adjusted by the user. This fusion
Linear Multiuser Receivers: Effective Interference, Effective Bandwidth and User Capacity
- IEEE Trans. Inform. Theory
, 1999
"... Multiuser receivers improve the performance of spread-spectrum and antenna-array systems by exploiting the structure of the multiaccess interference when demodulating the signal of a user. Much of the previous work on the performance analysis of multiuser receivers has focused on their ability to re ..."
Abstract
-
Cited by 361 (13 self)
- Add to MetaCart
to reject worst case interference. Their performance in a power-controlled network and the resulting user capacity are less well-understood. In this paper, we show that in a large system with each user using random spreading sequences, the limiting interference effects under several linear multiuser
On the totally asynchronous interference channel with single-user receivers
- International Symp. Inf. Theory, ISIT 2009, Seoul, Korea
, 2009
"... Abstract—The performance characterization of decentralized wireless networks with uncoordinated sender-destination pairs motivates the study of the totally asynchronous interference channel with single-user receivers. Since this channel is not information stable, its capacity region is determined re ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
Abstract—The performance characterization of decentralized wireless networks with uncoordinated sender-destination pairs motivates the study of the totally asynchronous interference channel with single-user receivers. Since this channel is not information stable, its capacity region is determined
Results 1 - 10
of
2,640