• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,840
Next 10 →

Password Authentication with Insecure Communication

by Leslie Lamport , 1981
"... A method of user password authentication is de-scribed which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a mi ..."
Abstract - Cited by 548 (0 self) - Add to MetaCart
microcomputer in the user's terminal.

Packet Switching In Radio Channels: Part III -- Polling and . . .

by Fouad A. Tobagi, Leonard Kleinrock - IEEE TRANSACTIONS ON COMMUNICATIONS , 1976
"... Here we continue the analytic study of packet switching in radio channels which we reported upon in our two previous papers [ 11, [2]. Again we consider a population of terminals communicating with a central station over a packet-switched radio channel. The allocation of bandwidth among the contend ..."
Abstract - Cited by 517 (5 self) - Add to MetaCart
the contending terminals can befixed [e.g., time-division multiple access (TDMA) or frequency-division multiple access (FDMA)]-,rundom [e.&, ALOHA or carrier sen? multiple access (CSMA)] or centrally controlled (e.g., polling or reservation). In this paper we show that with a large population of bursty users

Applying and Validating AI-Based QoS Profiling for NGN User Terminals

by F. Weber, W. Fuhrmann, U. Trick, U. Bleimann, B. Ghita
"... This paper addresses the identification of NGN (Next Generation Networks) user terminals experiencing similar QoS (Quality of Service) conditions. This approach aims on the reduction of network traffic resulting from comprehensive QoS monitoring. An ART 2 ANN (Adaptive Resonance Theory 2 Artifical N ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
This paper addresses the identification of NGN (Next Generation Networks) user terminals experiencing similar QoS (Quality of Service) conditions. This approach aims on the reduction of network traffic resulting from comprehensive QoS monitoring. An ART 2 ANN (Adaptive Resonance Theory 2 Artifical

A Power Optimized Display Memory Organization for Handheld User Terminals

by Lieven Hollevoet, Andy Dewilde, Kristof Denolf, Francky Catthoor, Filip Louagie
"... Today’s handheld devices become more and more mul-timedia capable. One subsystem of a multimedia terminal that accounts for a considerable amount of the total power consumption is the display unit. The backlight is the ma-jor culprit there. As new display units without backlights emerge, the data tr ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Today’s handheld devices become more and more mul-timedia capable. One subsystem of a multimedia terminal that accounts for a considerable amount of the total power consumption is the display unit. The backlight is the ma-jor culprit there. As new display units without backlights emerge, the data

Efficient power control via pricing in wireless data networks

by Cem U. Saraydar, Narayan B. M, Senior Member, David J. Goodman - IEEE Trans. on Commun , 2002
"... Abstract—A major challenge in the operation of wireless communications systems is the efficient use of radio resources. One important component of radio resource management is power control, which has been studied extensively in the context of voice communications. With the increasing demand for wir ..."
Abstract - Cited by 339 (8 self) - Add to MetaCart
for wireless data services, it is necessary to establish power control algorithms for information sources other than voice. We present a power control solution for wireless data in the analytical setting of a game theoretic framework. In this context, the quality of service (QoS) a wireless terminal receives

Impact of Concentrated Azimuth Power Spectrum for Performance Evaluation of User Terminal Array Antenna

by Jun-ichi Takada
"... In the previous study, the author has proposed a simplified propagation modeling and a performance evaluation scheme of MIMO antennas, which utilizes the ideal base-station antenna configuration so that the angular power spectrum model for the user terminal is applicable for Kronecker MIMO model. By ..."
Abstract - Add to MetaCart
In the previous study, the author has proposed a simplified propagation modeling and a performance evaluation scheme of MIMO antennas, which utilizes the ideal base-station antenna configuration so that the angular power spectrum model for the user terminal is applicable for Kronecker MIMO model

Sum Capacity of a Gaussian Vector Broadcast Channel

by Wei Yu, John M. Cioffi - IEEE Trans. Inform. Theory , 2002
"... This paper characterizes the sum capacity of a class of non-degraded Gaussian vectB broadcast channels where a singletransmitter with multiple transmit terminals sends independent information to multiple receivers. Coordinat+[ is allowed among the transmit teminals, but not among the different recei ..."
Abstract - Cited by 279 (21 self) - Add to MetaCart
This paper characterizes the sum capacity of a class of non-degraded Gaussian vectB broadcast channels where a singletransmitter with multiple transmit terminals sends independent information to multiple receivers. Coordinat+[ is allowed among the transmit teminals, but not among the different

Packet Switching in Radio Channels: Part I -- Carrier sense multiple-access modes and their throughput-delay characteristics

by Leonard Kleinrock, Fouad A. Tobagi , 1975
"... Radio communication is considered as a method for providing remote terminal access to computers. Digital byte streams from each terminal are partitioned into packets (blocks) and transmitted in a burst mode over a shared radio channel. When many terminals operate in this fashion, transmissions may c ..."
Abstract - Cited by 259 (2 self) - Add to MetaCart
Radio communication is considered as a method for providing remote terminal access to computers. Digital byte streams from each terminal are partitioned into packets (blocks) and transmitted in a burst mode over a shared radio channel. When many terminals operate in this fashion, transmissions may

A Stream Input-Output System

by Dennis M. Ritchie - AT&T Bell Laboratories Technical Journal , 1984
"... In a new version of the Unix operating system, a flexible coroutine-based design replaces the traditional rigid connection between processes and terminals or networks. Processing modules may be inserted dynamically into the stream that connects a user's program to a device. Programs may also co ..."
Abstract - Cited by 240 (1 self) - Add to MetaCart
In a new version of the Unix operating system, a flexible coroutine-based design replaces the traditional rigid connection between processes and terminals or networks. Processing modules may be inserted dynamically into the stream that connects a user's program to a device. Programs may also

reCAPTCHA: Human-Based Character Recognition via Web Security Measures

by Luis Von Ahn, Benjamin Maurer, Colin Mcmillen, David Abraham, Manuel Blum , 2008
"... widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled ..."
Abstract - Cited by 236 (3 self) - Add to MetaCart
of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words. ACAPTCHA (1, 2) is a challenge response test used on the World Wide Web to de termine whether a user is a human or a computer. The acronym stands for Completely Automated Public
Next 10 →
Results 1 - 10 of 3,840
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University