Results 1 - 10
of
2,818
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment
- In IEEE Infocom
, 2001
"... Energy-aware design and evaluation of network protocols requires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network interfaces and device specifications do not ..."
Abstract
-
Cited by 669 (3 self)
- Add to MetaCart
Energy-aware design and evaluation of network protocols requires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network interfaces and device specifications do
Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,
, 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract
-
Cited by 622 (2 self)
- Add to MetaCart
in the management literature, in fact little is known about the reasons why "enriched" work sometimes leads to positive outcomes for workers and for their employing organizations. Even less is known about the relative effectiveness of various strategies for carrying out the redesign of work One reason
Ad hoc positioning system (APS) using AoA
, 2003
"... AoA(Angle of Arrival) is a well known method used for positioning in providing services such as E911, and for other military and civil radio-location applications, such as sonars and radars. Although devices such as GPS receivers and digital compasses provide good positioning and orientation outdoo ..."
Abstract
-
Cited by 484 (6 self)
- Add to MetaCart
AoA(Angle of Arrival) is a well known method used for positioning in providing services such as E911, and for other military and civil radio-location applications, such as sonars and radars. Although devices such as GPS receivers and digital compasses provide good positioning and orientation
Sampling signals with finite rate of innovation
- IEEE Transactions on Signal Processing
, 2002
"... Abstract—Consider classes of signals that have a finite number of degrees of freedom per unit of time and call this number the rate of innovation. Examples of signals with a finite rate of innovation include streams of Diracs (e.g., the Poisson process), nonuniform splines, and piecewise polynomials ..."
Abstract
-
Cited by 350 (67 self)
- Add to MetaCart
and reconstruction based on spline kernels. The key in all constructions is to identify the innovative part of a signal (e.g., time instants and weights of Diracs) using an annihilating or locator filter: a device well known in spectral analysis and error-correction coding. This leads to standard computational
Breaking Spectrum Gridlock with Cognitive Radios: An Information Theoretic Perspective
, 2008
"... Cognitive radios hold tremendous promise for increasing spectral efficiency in wireless systems. This paper surveys the fundamental capacity limits and associated transmission techniques for different wireless network design paradigms based on this promising technology. These paradigms are unified b ..."
Abstract
-
Cited by 265 (4 self)
- Add to MetaCart
by the definition of a cognitive radio as an intelligent wireless communication device that exploits side information about its environment to improve spectrum utilization. This side information typically comprises knowledge about the activity, channels, codebooks and/or messages of other nodes with which
A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems
- Software – Practice & Experience
, 1997
"... It is well-known that Reed-Solomon codes may be used to provide error correction for multiple failures in RAID-like systems. The coding technique itself, however, is not as well-known. To the coding theorist, this technique is a straightforward extension to a basic coding paradigm and needs no speci ..."
Abstract
-
Cited by 234 (37 self)
- Add to MetaCart
It is well-known that Reed-Solomon codes may be used to provide error correction for multiple failures in RAID-like systems. The coding technique itself, however, is not as well-known. To the coding theorist, this technique is a straightforward extension to a basic coding paradigm and needs
Algorithms for Parallel Memory I: Two-Level Memories
, 1992
"... We provide the first optimal algorithms in terms of the number of input/outputs (I/Os) required between internal memory and multiple secondary storage devices for the problems of sorting, FFT, matrix transposition, standard matrix multiplication, and related problems. Our two-level memory model is n ..."
Abstract
-
Cited by 235 (27 self)
- Add to MetaCart
algorithms' performance can be significantly better than those obtained by the well-known but nonopti...
Heart Failure Left Ventricular Assist Devices in Patients With End-Stage Heart Failure: Suggestion of an Alternative Treatment Based on Clinically Well-Known Concepts
"... Encouraging results were obtained by using left ventricular assist devices (LVADs) in patients with end-stage heart failure (HF) that exhibits extremely high mortality and who were not candidates for heart transplantation. By using this so-called destina-tion therapy (DT), a substantial percentage o ..."
Abstract
- Add to MetaCart
Encouraging results were obtained by using left ventricular assist devices (LVADs) in patients with end-stage heart failure (HF) that exhibits extremely high mortality and who were not candidates for heart transplantation. By using this so-called destina-tion therapy (DT), a substantial percentage
Article Left Ventricular Assist Devices in Patients With End-Stage Heart Failure: Suggestion of an Alternative Treatment Based on Clinically Well-Known Concepts
"... Encouraging results were obtained by using left ventricular assist devices (LVADs) in patients with end-stage heart failure (HF) that exhibits extremely high mortality and who were not candidates for heart transplantation. By using this so-called destina-tion therapy (DT), a substantial percentage o ..."
Abstract
- Add to MetaCart
Encouraging results were obtained by using left ventricular assist devices (LVADs) in patients with end-stage heart failure (HF) that exhibits extremely high mortality and who were not candidates for heart transplantation. By using this so-called destina-tion therapy (DT), a substantial percentage
A Cooperative Intrusion Detection System for Ad Hoc Networks
, 2003
"... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized ..."
Abstract
-
Cited by 193 (3 self)
- Add to MetaCart
on attack types and sources. For several well-known attacks, we can apply a simple rule to identify the attack type when an anomaly is reported. In some cases, these rules can also help identify the attackers. We address the run-time resource constraint problem using a cluster-based detection scheme where
Results 1 - 10
of
2,818