The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High definition video streams are gaining larger shares of the Internet usage for typical users on daily basis. This is an expected result of the current boom in the online standard and high definition (HD) video streaming services such as YouTube and Hulu. Because of these video streams' unique statistical characteristics and their high bandwidth requirements, they are considered to be a continuous...
In this paper we consider efficient and low complexity scheduling algorithms for multiuser multiple-input multiple-output (MIMO) systems. The optimal user scheduling involves an exhaustive search, which becomes very complex for realistic numbers of users and transmit antennas. Among various suboptimal but low complexity algorithms, greedy algorithms with heuristic scheduling metrics have been shown...
We revisit the problem of scheduling the sources transmissions in a many-to-one flow to provide reliable communication between n sources and a single destination. The performance of coding-aware scheduling is studied based on both digital network coding (DNC) and analog network coding (ANC). We discuss some special cases in which an optimal ANC-based schedule can be constructed efficiently. Finally,...
Survivability of wireless mesh networks (WMNs) is a crucial issue that has not received enough attention in the literature. In this paper, we present a network coding-based protection scheme that overcomes the deficiencies in traditional proactive and reactive protection mechanisms. Proactive schemes ((1+1) protection) provide instantaneous recovery, but are resource-hungry. While reactive schemes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.