Πλοήγηση ανά Θέμα "Telecommunication"
Αποτελέσματα 1-7 από 7
-
Asymptotically optimal policies for wireless networks with rechargeable batteries
(2008)We consider the problem of cross-layer resource allocation for single-hop, time-varying, wireless networks operating with rechargeable batteries under general arrival, channel and recharge processes. The objective is to ... -
Fast power-up active link protection in autonomous distributed transmitter power control
(2008)In this work, we propose an enhancement to the DPC/ALP (Distributed Power Control with Active Link Protection) algorithm that allows fast power ramp-up without compromising the ALP guarantee. The original DPC algorithm was ... -
Network coding and service reneging for real-time communication in sensor networks
(2010)In a number of application domains, the volatility of the environment where Wireless Sensor Networks (WSNs) should operate engenders time constraints on the generation, processing, and communication of sensory data. In ... -
A second-order cone deflation approach to joint multiuser downlink beamforming and admission control
(2007)Multiuser downlink beamforming under quality of service (QoS) constraints has attracted considerable interest in recent years, because it is particularly appealing from a network operator's perspective (e.g., UMTS, 802.16e). ... -
Storing and replication in topic-based publish/subscribe networks
(2010)In current publish/subscribe networks messages are not stored and only active subscribers receive published messages. However, in a dynamic scenario a user may be interested in content published before the subscription ... -
Transmit rate control for energy-efficient estimation in wireless sensor networks
(2010)We study the impact of physical layer (PHY) transmit rate control on energy efficient estimation in wireless sensor networks. A sensor network collects measurements and transmits them to a Fusion Center (FC) with controllable ... -
Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification
(2006)Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...