Filters








166,547 Hits in 6.1 sec

Information-Centric Wireless Networks with Virtualization and D2D Communications [article]

Kan Wang, F. Richard Yu, Hongyan Li, Zhengquan Li
2016 arXiv   pre-print
However, when it comes to the multi-operator scenario, the direct content sharing between different operators via D2D communications is typically infeasible.  ...  Although some excellent works have focused on these two technologies, device-to-device (D2D) communications have not beeen investigated in information-centric virtualized cellular networks.  ...  j s c mi ), (1) where e c mi is the estimated backhaul bandwidth reduction via caching, and s c mi denotes the storage space necessary for c mi .  ... 
arXiv:1612.07889v1 fatcat:jnyx32xdufcs3cnjulzaucdose

HAS4: A Heuristic Adaptive Sink Sensor Set Selection for Underwater AUV-Aid Data Gathering Algorithm

Xingwang Wang, Debing Wei, Xiaohui Wei, Junhong Cui, Miao Pan
2018 Sensors  
For each round of data gathering, the AUV visits part of the sensors, and the communication between AUV and sensor nodes is a novel high-speed magnetic-induction communication system.  ...  In many underwater applications, it is not quick to retrieve sensed data, which gives us the opportunity to leverage mobile autonomous underwater vehicles (AUV) as data mules to periodically collect it  ...  Add all sensor to S C ; Ascending sort S C via lifetime e i −p out i p out i (mi) ; Define the threshold lifetime T l to be the lifetime of the nl -th sensor in S C ; while S C is not empty do u ← S C  ... 
doi:10.3390/s18124110 pmid:30477173 fatcat:xontf3mqrzagvfvlqtbs3mvznm

Semantic Security for the Wiretap Channel [chapter]

Mihir Bellare, Stefano Tessaro, Alexander Vardy
2012 Lecture Notes in Computer Science  
On the second front (schemes), we provide the first explicit scheme with all the following characteristics: it is proven to achieve both security (ss and mis, not just mis-r) and decodability; it has optimal  ...  The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is "noisier" than  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
doi:10.1007/978-3-642-32009-5_18 fatcat:hyney2wvrjaivnelgknsuvowre

Topic Identification and Discovery on Text and Speech

Chandler May, Francis Ferraro, Alan McCree, Jonathan Wintrode, Daniel Garcia-Romero, Benjamin Van Durme
2015 Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing  
We also compare the learned representations in their ability to discover topics, quantified by distributional similarity to gold-standard topics and by human interpretability.  ...  We compare the multinomial i-vector framework from the speech community with LDA, SAGE, and LSA as feature learners for topic ID on multinomial speech and text data.  ...  We would like to thank the Johns Hopkins HLTCOE for providing support. Any opinions expressed in this work are those of the authors.  ... 
doi:10.18653/v1/d15-1285 dblp:conf/emnlp/MayFMWGD15 fatcat:psz5mdd7rzdlvason6hcbfnibe

Communications Skills in the Pharmacy Profession: A Cross Sectional Survey of UK Registered Pharmacists and Pharmacy Educators

Zahraa Jalal, Anthony Cox, Neera Goel, Nikita Vaitha, Kathryn King, Jon Ward
2018 Pharmacy  
A second survey was sent to all UK Schools of Pharmacy investigating communication skills training and teaching.  ...  The first survey was sent to UK practicing pharmacists examining their current communication skills and interest in behavioural counselling techniques such as Motivational Interviewing (MI).  ...  Acknowledgments: We would like to thank the pharmacists who participated in the study, and the Schools of Pharmacy who contributed to the study.  ... 
doi:10.3390/pharmacy6040132 pmid:30545072 pmcid:PMC6306767 fatcat:rrl37njnvzfihodrtmmcscfmz4

Towards enhancing interoperability in medical information systems

Karim Zarour, Nacereddine Zarour, Pierre-Jean Charrel
2011 Proceedings of the 6th International Symposium on Health Informatics and Bioinformatics  
The proposed architecture is meant to include all the concepts necessary to perform all activities related to medical information system.  ...  This architecture is based on agent, ontology and Peer to Peer.  ...  The interoperability of the MIS is reached via unavoidable standards and technologies: XML for the syntactic interoperability, FIPA-ACL / XML [7] as common communication protocol and ontology for semantic  ... 
doi:10.1109/hibit.2011.6450802 fatcat:ong5wmc5n5eqlfqif2jxbhx7me

Distribution Of Mi-Safe Prototype Tool

Gloria Peralta, Myra Van Der Meulen, Julia Vroom, Albert Scrieciu
2017 Zenodo  
The FAST team considers the distribution of MI-SAFE package to facilitate the generation of shared-values as a key aspect of the project and will continue the distribution for the remainder of the project  ...  A key part of this process is the demonstration, release and distribution of the MI-SAFE package.  ...  Community Where and when can we see more projects or products similar to FAST and MI-SAFE? The initial page of the MI-SAFE viewer offers the possibility to join the FAST Community.  ... 
doi:10.5281/zenodo.884470 fatcat:qi2fv5x2t5epzeyaalux2tqyym

Supporting multi-party voice-over-IP services with peer-to-peer stream processing

Xiaohui Gu, Zhen Wen, Philip S. Yu, Zon-Yin Shae
2005 Proceedings of the 13th annual ACM international conference on Multimedia - MULTIMEDIA '05  
distributes the mixed audio stream to all listeners.  ...  The decoupled model allows us to optimize and adapt the P2P stream mixing and distribution processes separately.  ...  that distributes the mixed audio stream to all listeners via a distribution tree.  ... 
doi:10.1145/1101149.1101210 dblp:conf/mm/GuWYS05 fatcat:yrdzsthk6jfffmnplfvjmuwify

Decentralized robust state estimation via a data-rate constrained sensor network

Teddy M. Cheng, Veerachai Malyavej, Andrey V. Savkin
2008 2008 47th IEEE Conference on Decision and Control  
The communications from the sensors to the fusion center are through data-rate constrained communication channels.  ...  This paper considers a decentralized robust state estimation problem for uncertain systems via a data-rate constrained sensor network.  ...  The only way of communicating information from the sensors to the fusion center is via digital communication channels.  ... 
doi:10.1109/cdc.2008.4738821 dblp:conf/cdc/ChengMS08 fatcat:l4sfmaevgzaovbgh3ac4cshf7q

Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments

Miss Laiha Mat Kiah, Keith M. Martin
2007 Future Generation Communication and Networking (FGCN 2007)  
Secure group communication allows a set of nodes (or devices) to communicate securely amongst each other over unprotected and open networks.  ...  Securing group communication in wired networks is fairly well understood, however wireless networks introduce further challenges as group members may move from one place to another while still remaining  ...  communicate via a foreign network (the visiting area) that may not be fully trusted.  ... 
doi:10.1109/fgcn.2007.144 dblp:conf/fgcn/KiahM07 fatcat:d637yesbc5emjdct37hljb66sm

A Cryptographic Treatment of the Wiretap Channel [article]

Mihir Bellare, Stefano Tessaro, Alexander Vardy
2012 arXiv   pre-print
One, that we call mis-security, is a mutual-information based metric in the I&C style.  ...  The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is "noisier" than  ...  This leads us to define mutualinformation security (mis) via where the maximum is over all random variables M over {0, 1} m .  ... 
arXiv:1201.2205v2 fatcat:aauo3zmwsvddfpv2f6wt5ehvfi

Slow admission and power control for small cell networks via distributed optimization

Siew Eng Nai, Tony Q. S. Quek, Merouane Debbah, Aiping Huang
2013 2013 IEEE Wireless Communications and Networking Conference (WCNC)  
Although small cell networks are environmentally friendly and can potentially improve the coverage and capacity of cellular layers, it is imperative to control the interference in such networks before  ...  In this paper, we investigate the distributed implementation of the joint admission and power control problem where the small cells can determine jointly their admissibility and transmit powers autonomously  ...  ms Mi to.  ... 
doi:10.1109/wcnc.2013.6554912 dblp:conf/wcnc/NaiQDH13 fatcat:osrgq2jzn5fovknzwjfckjvjky

Learning Efficient Multi-agent Communication: An Information Bottleneck Approach [article]

Rundong Wang, Xu He, Runsheng Yu, Wei Qiu, Bo An, Zinovi Rabinovich
2020 arXiv   pre-print
We show that IMAC converges faster and leads to efficient communication among agents under the limited bandwidth as compared to many baseline methods.  ...  The protocol and scheduler jointly determine which agent is communicating what message and to whom.  ...  According to the principle of maximum entropy (Jaynes, 1957) , the Gaussian distribution has maximum entropy relative to all probability distributions covering the entire real line (−∞, ∞) but having  ... 
arXiv:1911.06992v2 fatcat:z5ytu52ryjcfjbgxzkqglo7la4

Distributed Cross-Layer Protocol Design for Magnetic Induction Communication in Wireless Underground Sensor Networks

Shih-Chun Lin, Ian F. Akyildiz, Pu Wang, Zhi Sun
2015 IEEE Transactions on Wireless Communications  
Index Terms-Wireless underground sensor network, magnetic induction communication, cross-layer optimization, Pareto optimal front, distributed power control, distributed protocol.  ...  First, a detailed overview is given for different communication functionalities from physical to network layers as well as the QoS requirements of applications.  ...  To the best of our knowledge, this work is the first to propose a coherent cross-layer protocol framework to optimize MI communication through a distributed approach in WUSNs.  ... 
doi:10.1109/twc.2015.2415812 fatcat:tf3zs52e6nedxe4ndrq4k4sunq

Cooperative Output Regulation of Heterogeneous Unknown Systems via Passification-Based Adaptation

Simone Baldi
2018 IEEE Control Systems Letters  
A passification method is adopted to design adaptive-gain distributed controllers solving the problem.  ...  whose output can converge to the exogenous signal; in the second step, command generator tracking is achieved via adaptive laws that make the output of each system converge to the output of the reference  ...  ACKNOWLEDGMENTS The author is grateful to Profs. B. Andrievsky and A. Fradkov for fruitful discussions on the passification method.  ... 
doi:10.1109/lcsys.2017.2778009 fatcat:7orlymslwvgwnfexfm7wefu25y
« Previous Showing results 1 — 15 out of 166,547 results