Results 241 to 250 of about 8,958,841 (288)
Some of the next articles are maybe not open access.

Concurrent access to point data

Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97), 2002
The B/sup +/-tree, R-tree and K-D-B tree have been proposed as the index structures for point data in a d-dimensional space. We apply the lock coupling technique to them to allow concurrent accesses. We discuss the two common user operations, search and insert, and present concurrency control algorithms for them.
Vincent Ng 0002, Tiko Kameda
openaire   +1 more source

An access point selection mechanism based on cooperation of access points and users movement

2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015
Public areas, such as train stations and airports, providing wireless Local Area Network (WLAN) services are increasing and expanding because of the rapid development of WLANs based on IEEE 802.11 standard. Moreover, because of the advances in smartphone tethering technology, portable access points (APs) such as mobile Wi-Fi routers are being utilized ...
Ryo Hamamoto   +4 more
openaire   +1 more source

Mobile robotic access point for transitional optimization of wireless access point positioning

2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), 2014
A mobile robotic access point (AP) is proposed to provide better wireless network environment. This AP automatically searches and moves to the best position to provide enough radio power for all devices connected to the AP. We designed the mobile robotic AP and evaluate its performance in experiment. It was found that the proposed AP can increase radio
Eisuke Nakata   +2 more
openaire   +1 more source

Nested Sparse Feedback Codes for Point-to-Point, Multiple Access, and Random Access Channels

2021 IEEE Information Theory Workshop (ITW), 2021
This paper investigates variable-length feedback codes for discrete memoryless channels in point-to-point, multiple access, and random access communication. The proposed nested code employs L decoding times nâ‚,nâ‚‚,…,n_L for the point-to-point and multiple access channels and KL decoding times {n_(k,â„“):1 ≤ k ≤ K,1 ≤ â„“ ≤ L} for the random
Recep Can Yavas   +2 more
openaire   +2 more sources

Access Points

"Access Points" ist die Schriftenreihe der Kolleg-Forschungsgruppe "Zugang zu kulturellen Gütern im digitalen Wandel" (KFG 33), die von der Deutschen Forschungsgemeinschaft gefördert wird. Die Kolleg-Forschungsgruppe erforscht – insbesondere am Beispiel von Kunst – sowohl die neuartigen Formen des Zugangs zu kulturellen Gütern als auch die neuen Formen
Frohne, Ursula, Schmücker, Reinold
openaire   +3 more sources

Counterfactuals and access points

Mind, 1999
Counterfactuals seem to make factual claims about something beyond the actual course of events. The problem of counterfactuals is that there seem to be no facts beyond the actual course of events, no "counterfacts". Taking sides on the issue as it thus presents itself, we have the realist, who says that the idea that all facts are about the actual ...
openaire   +1 more source

ACCESS POINTS FOR SERIALS

Library Review, 1981
SERIALS pose a problem for cataloguers which is essentially simple in its solution. Title entry is the obvious and most satisfactory method of entering a serial in a catalogue and has been recognised as such by modern cataloguing codes. However, a large number of serials are issued or published by corporate bodies and because cataloguing codes have ...
openaire   +1 more source

Trajectory optimization for mobile access point

2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017
We consider the problem of trajectory optimization of an Unmanned Air Vehicle (UAV) that is equipped with an wireless access point (AP) to collect data from the ground users. The goal is to find constant altitude path and velocity of the UAV during the flight time such that the weighted sum-rate of the users is maximized.
Rajeev Gangula   +3 more
openaire   +1 more source

Detection of wireless fake access points

2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020
Wireless networks have become a common part of everyone’s life who wants to connect to the Internet network. Despite the rapid development of wireless technologies, common users still do not pay much attention to the security questions. One of the most challenging security problems of Wi-Fi networks is to detect and prevent the fake access point attack.
Norbert Lövinger   +3 more
openaire   +1 more source

Access Point Design with a Genetic Algorithm

2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
The interest in deploying local wireless networks has increased in the corporate environment, in recent years, as a result of several improvements in their features. Nevertheless, there are some problems caused by inadequate positions of access points (APs) which overload some cells of the total area to be covered. Some strategies of AP positioning aim
Marco Antonio S. Barbosa   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy