The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Existing researches on the theoretical analysis for Proportional Fair (PF) scheduling are mostly based on the full buffer assumption while the user always has a bursty traffic in reality. In this paper, an analytical framework for PF scheduling in an Orthogonal Frequency Division Multiple Access (OFDMA) wireless network is proposed, and the user traffic is set to follow a poisson arrival process....
The development of a city gradually fosters different functional regions, and between these regions there exists different social information due to human activities. In this paper, a Region Activation Entropy Model (RAEM) is proposed to discover the social relations hidden between the regions. Specifically we segment a city into coherent regions according the base station (BS) position and detect...
For trust in software, developers spend much effort debugging to ensure that software behaviors as expected. Spectrum-based fault localization techniques (SFL) make use of runtime coverage of program elements, like statements, branches and du-pairs, and then check codes in the order of the rank of suspiciousness. So, correct elements with higher suspiciousness than faulty elements cause the loss of...
Recently, mobile social networking in proximity (MSNP) has gained tremendous attentions, which refers to the social interactions among physically proximate mobile users directly through the Bluetooth/WiFi interfaces on their Smartphones or other mobile devices. MSNP applications can provide users more opportunities to discover and make new social interactions within proximity area, e.g., Airports,...
Atmospheric turbulence is a main limiting factor to the application of wireless laser communication in marine environment, which causes intensity variation and wavefront aberration in the laser beam. Characterizing the wavefront aberration of the laser beam is an important step for mitigating the effect of turbulence. In this paper, we focus on measurement and analysis of wavefront aberration in laser...
While optimizing database performance, parallel query technology can significantly improve the throughput and resource utilization of the database server. Interactions among different queries which run concurrently can have a great impact on system performance. However, conventional optimizing strategies of parallel query often only focus on individual queries rather than their interactions. In order...
Internet-scale software becomes an important mode of constructing software systems with the development of internet. Open, dynamic and uncontrollable Internet environment makes dependability evaluation of Internet-scale software very important. It is lack of a dependability evaluation model that analyzes system architecture from the most foundational elements and integrate aspects that impacts on...
Tail-biting convolutional codes (TBCC) provide an efficient method to eliminate the rate loss caused by the known-tail encoding. To simplify the decoder design, circular Viterbi algorithm (CVA) has been proposed by recording and repeating the received block of (soft) symbols beyond the block boundary and continuing Viterbi decoding. However, CVA does not converge in the presence of circular trap....
Trust quantification is an important issue of dynamic trust management. Trust is fuzzy and dynamic, if exact math tools are used to calculate trust, there is information missing in the calculation. In this paper, we use fuzzy comprehensive evaluation method to quantify trust and propose a trust quantification algorithm. Simulation results show that the trust quantification algorithm can effectively...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.