• Documents
  • Authors
  • Tables

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,818
Next 10 →

Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment

by Laura Marie Feeney, Martin Nilsson - In IEEE Infocom , 2001
"... Energy-aware design and evaluation of network protocols requires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network interfaces and device specifications do not ..."
Abstract - Cited by 669 (3 self) - Add to MetaCart
Energy-aware design and evaluation of network protocols requires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network interfaces and device specifications do

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
in the management literature, in fact little is known about the reasons why "enriched" work sometimes leads to positive outcomes for workers and for their employing organizations. Even less is known about the relative effectiveness of various strategies for carrying out the redesign of work One reason

Ad hoc positioning system (APS) using AoA

by Dragos Niculescu, Badri Nath , 2003
"... AoA(Angle of Arrival) is a well known method used for positioning in providing services such as E911, and for other military and civil radio-location applications, such as sonars and radars. Although devices such as GPS receivers and digital compasses provide good positioning and orientation outdoo ..."
Abstract - Cited by 484 (6 self) - Add to MetaCart
AoA(Angle of Arrival) is a well known method used for positioning in providing services such as E911, and for other military and civil radio-location applications, such as sonars and radars. Although devices such as GPS receivers and digital compasses provide good positioning and orientation

Sampling signals with finite rate of innovation

by Martin Vetterli, Pina Marziliano, Thierry Blu - IEEE Transactions on Signal Processing , 2002
"... Abstract—Consider classes of signals that have a finite number of degrees of freedom per unit of time and call this number the rate of innovation. Examples of signals with a finite rate of innovation include streams of Diracs (e.g., the Poisson process), nonuniform splines, and piecewise polynomials ..."
Abstract - Cited by 350 (67 self) - Add to MetaCart
and reconstruction based on spline kernels. The key in all constructions is to identify the innovative part of a signal (e.g., time instants and weights of Diracs) using an annihilating or locator filter: a device well known in spectral analysis and error-correction coding. This leads to standard computational

Breaking Spectrum Gridlock with Cognitive Radios: An Information Theoretic Perspective

by Andrea Goldsmith, Syed Ali Jafar, Ivana Marić, Sudhir Srinivasa , 2008
"... Cognitive radios hold tremendous promise for increasing spectral efficiency in wireless systems. This paper surveys the fundamental capacity limits and associated transmission techniques for different wireless network design paradigms based on this promising technology. These paradigms are unified b ..."
Abstract - Cited by 265 (4 self) - Add to MetaCart
by the definition of a cognitive radio as an intelligent wireless communication device that exploits side information about its environment to improve spectrum utilization. This side information typically comprises knowledge about the activity, channels, codebooks and/or messages of other nodes with which

A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems

by James S. Plank - Software – Practice & Experience , 1997
"... It is well-known that Reed-Solomon codes may be used to provide error correction for multiple failures in RAID-like systems. The coding technique itself, however, is not as well-known. To the coding theorist, this technique is a straightforward extension to a basic coding paradigm and needs no speci ..."
Abstract - Cited by 234 (37 self) - Add to MetaCart
It is well-known that Reed-Solomon codes may be used to provide error correction for multiple failures in RAID-like systems. The coding technique itself, however, is not as well-known. To the coding theorist, this technique is a straightforward extension to a basic coding paradigm and needs

Algorithms for Parallel Memory I: Two-Level Memories

by Jeffrey Scott Vitter, Elizabeth A.M. Shriver , 1992
"... We provide the first optimal algorithms in terms of the number of input/outputs (I/Os) required between internal memory and multiple secondary storage devices for the problems of sorting, FFT, matrix transposition, standard matrix multiplication, and related problems. Our two-level memory model is n ..."
Abstract - Cited by 235 (27 self) - Add to MetaCart
algorithms' performance can be significantly better than those obtained by the well-known but nonopti...

Heart Failure Left Ventricular Assist Devices in Patients With End-Stage Heart Failure: Suggestion of an Alternative Treatment Based on Clinically Well-Known Concepts

by Panayotis Fantidis, Ibrahim Tarhini, Ijaz Khan, Tomas Pineda, Juan Antonio Corrales
"... Encouraging results were obtained by using left ventricular assist devices (LVADs) in patients with end-stage heart failure (HF) that exhibits extremely high mortality and who were not candidates for heart transplantation. By using this so-called destina-tion therapy (DT), a substantial percentage o ..."
Abstract - Add to MetaCart
Encouraging results were obtained by using left ventricular assist devices (LVADs) in patients with end-stage heart failure (HF) that exhibits extremely high mortality and who were not candidates for heart transplantation. By using this so-called destina-tion therapy (DT), a substantial percentage

Article Left Ventricular Assist Devices in Patients With End-Stage Heart Failure: Suggestion of an Alternative Treatment Based on Clinically Well-Known Concepts

by Panayotis Fantidis, Ibrahim Tarhini, Ijaz Khan, Tomas Pineda, Juan Antonio Corrales
"... Encouraging results were obtained by using left ventricular assist devices (LVADs) in patients with end-stage heart failure (HF) that exhibits extremely high mortality and who were not candidates for heart transplantation. By using this so-called destina-tion therapy (DT), a substantial percentage o ..."
Abstract - Add to MetaCart
Encouraging results were obtained by using left ventricular assist devices (LVADs) in patients with end-stage heart failure (HF) that exhibits extremely high mortality and who were not candidates for heart transplantation. By using this so-called destina-tion therapy (DT), a substantial percentage

A Cooperative Intrusion Detection System for Ad Hoc Networks

by Yi-an Huang , 2003
"... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized ..."
Abstract - Cited by 193 (3 self) - Add to MetaCart
on attack types and sources. For several well-known attacks, we can apply a simple rule to identify the attack type when an anomaly is reported. In some cases, these rules can also help identify the attackers. We address the run-time resource constraint problem using a cluster-based detection scheme where
Next 10 →
Results 1 - 10 of 2,818
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University