نتایج جستجو برای: fi refly algorithm
تعداد نتایج: 778487 فیلتر نتایج به سال:
We study the following online problem. Each advertiser ai has a value vi, demand di, and frequency cap fi. Supply units arrive online, each one associated with a user. Each advertiser can be assigned at most di units in all, and at most fi units from the same user. The goal is to design an online allocation algorithm maximizing total value. We first show a deterministic upper bound of 3/4-compe...
Fiber-Wireless (Fi-Wi) is proposed as a hybrid access network (e.g. PON) with wireless access network (e.g. WMN) to provide high bandwidth, cost effective, and last mile internet access. It is powerful hybrid architecture of optimal backend and wireless front-end to support high data rates and throughput with minimum delay. This paper involves different types of optimizing algorithms which help...
Given a sequence f1(x1), f2(x1, x2), . . . , fk(x1, . . . , xk) of boolean functions, each fi takes the value 1 at a single point of the form x 0 1, x 0 2, . . . , xi , i " 1, 2, . . . , k. The length of all xi is n, N " 2n. It is shown how to find xk (k # 2) using kΠ ! N/4 ! 2 simultaneous evaluations of functions of the form fi, fi%1 with an error probability of order k/ ! N. This is ! 2 time...
In this paper, estimation of mobility using received signal strength is presented. In contrast to standard methods, speed can be inferred without the use of any additional hardware like accelerometer, gyroscope or position estimator. The strength of Wi-Fi signal is considered herein to compute the time-domain features such as mean, minimum, maximum, and autocorrelation. The experiments are carr...
By taking advantage of the ever growing deployment of wireless networks, the automotive industry is increasingly enabling vehicles to communicate with one another and with the infrastructure, with benefits to information delivery and safety on the road. Vertical Handovers can be used to ensure that the Quality of Service demanded by applications (e.g., throughput, latency) is met while the vehi...
This paper presents a novel pre-shared key (PSK) agreement scheme to establish a secure connection between a Wi-Fi client and access point (AP) without prior knowledge of a password. The standard IEEE 802.11 security method, Robust Security Network Association, widely known as Wi-Fi Protected Access (WPA) and WPA2, derives a shared cryptographic key if and only if a user provides an identical p...
In this paper, we consider the problem of touring a sequence of line segments in presence of polygonal domain fences. In this problem there is a sequence S = (s = S0, . . . , Sk, Sk+1 = t) in which s and t are respectively start and target points and S1, . . . , Sk are line segments in the plane. Also, we are given a sequence F = (F0, . . . , Fk) of planar polygonal domains called fences such t...
In recent years, combining multiuser detection and intelligence computer scheme have received considerable attention. In this paper, adaptive fuzzy-inference multistage matrix wiener filtering (FI-MMWF) techniques, based on the minimum mean-square error criterion, are proposed for ultra-wideband (UWB) impulse radio communication systems. These FI-MMWF-based algorithms employ a time-varying fuzz...
A shape invariant model for functions f1,...,fn specifies that each individual function fi can be related to a common shape function g through the relation fi(x)=aig(cix + di) + bi. We consider a flexible mixture model that allows multiple shape functions g1,...,gK, where each fi is a shape invariant transformation of one of those gk. We derive an MCMC algorithm for fitting the model using Baye...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید