Results 1 - 10
of
3,840
Password Authentication with Insecure Communication
, 1981
"... A method of user password authentication is de-scribed which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a mi ..."
Packet Switching In Radio Channels: Part III -- Polling and . . .
- IEEE TRANSACTIONS ON COMMUNICATIONS
, 1976
"... Here we continue the analytic study of packet switching in radio channels which we reported upon in our two previous papers [ 11, [2]. Again we consider a population of terminals communicating with a central station over a packet-switched radio channel. The allocation of bandwidth among the contend ..."
Abstract
-
Cited by 517 (5 self)
- Add to MetaCart
the contending terminals can befixed [e.g., time-division multiple access (TDMA) or frequency-division multiple access (FDMA)]-,rundom [e.&, ALOHA or carrier sen? multiple access (CSMA)] or centrally controlled (e.g., polling or reservation). In this paper we show that with a large population of bursty users
Applying and Validating AI-Based QoS Profiling for NGN User Terminals
"... This paper addresses the identification of NGN (Next Generation Networks) user terminals experiencing similar QoS (Quality of Service) conditions. This approach aims on the reduction of network traffic resulting from comprehensive QoS monitoring. An ART 2 ANN (Adaptive Resonance Theory 2 Artifical N ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
This paper addresses the identification of NGN (Next Generation Networks) user terminals experiencing similar QoS (Quality of Service) conditions. This approach aims on the reduction of network traffic resulting from comprehensive QoS monitoring. An ART 2 ANN (Adaptive Resonance Theory 2 Artifical
A Power Optimized Display Memory Organization for Handheld User Terminals
"... Today’s handheld devices become more and more mul-timedia capable. One subsystem of a multimedia terminal that accounts for a considerable amount of the total power consumption is the display unit. The backlight is the ma-jor culprit there. As new display units without backlights emerge, the data tr ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Today’s handheld devices become more and more mul-timedia capable. One subsystem of a multimedia terminal that accounts for a considerable amount of the total power consumption is the display unit. The backlight is the ma-jor culprit there. As new display units without backlights emerge, the data
Efficient power control via pricing in wireless data networks
- IEEE Trans. on Commun
, 2002
"... Abstract—A major challenge in the operation of wireless communications systems is the efficient use of radio resources. One important component of radio resource management is power control, which has been studied extensively in the context of voice communications. With the increasing demand for wir ..."
Abstract
-
Cited by 339 (8 self)
- Add to MetaCart
for wireless data services, it is necessary to establish power control algorithms for information sources other than voice. We present a power control solution for wireless data in the analytical setting of a game theoretic framework. In this context, the quality of service (QoS) a wireless terminal receives
Impact of Concentrated Azimuth Power Spectrum for Performance Evaluation of User Terminal Array Antenna
"... In the previous study, the author has proposed a simplified propagation modeling and a performance evaluation scheme of MIMO antennas, which utilizes the ideal base-station antenna configuration so that the angular power spectrum model for the user terminal is applicable for Kronecker MIMO model. By ..."
Abstract
- Add to MetaCart
In the previous study, the author has proposed a simplified propagation modeling and a performance evaluation scheme of MIMO antennas, which utilizes the ideal base-station antenna configuration so that the angular power spectrum model for the user terminal is applicable for Kronecker MIMO model
Sum Capacity of a Gaussian Vector Broadcast Channel
- IEEE Trans. Inform. Theory
, 2002
"... This paper characterizes the sum capacity of a class of non-degraded Gaussian vectB broadcast channels where a singletransmitter with multiple transmit terminals sends independent information to multiple receivers. Coordinat+[ is allowed among the transmit teminals, but not among the different recei ..."
Abstract
-
Cited by 279 (21 self)
- Add to MetaCart
This paper characterizes the sum capacity of a class of non-degraded Gaussian vectB broadcast channels where a singletransmitter with multiple transmit terminals sends independent information to multiple receivers. Coordinat+[ is allowed among the transmit teminals, but not among the different
Packet Switching in Radio Channels: Part I -- Carrier sense multiple-access modes and their throughput-delay characteristics
, 1975
"... Radio communication is considered as a method for providing remote terminal access to computers. Digital byte streams from each terminal are partitioned into packets (blocks) and transmitted in a burst mode over a shared radio channel. When many terminals operate in this fashion, transmissions may c ..."
Abstract
-
Cited by 259 (2 self)
- Add to MetaCart
Radio communication is considered as a method for providing remote terminal access to computers. Digital byte streams from each terminal are partitioned into packets (blocks) and transmitted in a burst mode over a shared radio channel. When many terminals operate in this fashion, transmissions may
A Stream Input-Output System
- AT&T Bell Laboratories Technical Journal
, 1984
"... In a new version of the Unix operating system, a flexible coroutine-based design replaces the traditional rigid connection between processes and terminals or networks. Processing modules may be inserted dynamically into the stream that connects a user's program to a device. Programs may also co ..."
Abstract
-
Cited by 240 (1 self)
- Add to MetaCart
In a new version of the Unix operating system, a flexible coroutine-based design replaces the traditional rigid connection between processes and terminals or networks. Processing modules may be inserted dynamically into the stream that connects a user's program to a device. Programs may also
reCAPTCHA: Human-Based Character Recognition via Web Security Measures
, 2008
"... widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled ..."
Abstract
-
Cited by 236 (3 self)
- Add to MetaCart
of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words. ACAPTCHA (1, 2) is a challenge response test used on the World Wide Web to de termine whether a user is a human or a computer. The acronym stands for Completely Automated Public
Results 1 - 10
of
3,840