Results 241 to 250 of about 8,958,841 (288)
Some of the next articles are maybe not open access.
Concurrent access to point data
Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97), 2002The B/sup +/-tree, R-tree and K-D-B tree have been proposed as the index structures for point data in a d-dimensional space. We apply the lock coupling technique to them to allow concurrent accesses. We discuss the two common user operations, search and insert, and present concurrency control algorithms for them.
Vincent Ng 0002, Tiko Kameda
openaire +1 more source
An access point selection mechanism based on cooperation of access points and users movement
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015Public areas, such as train stations and airports, providing wireless Local Area Network (WLAN) services are increasing and expanding because of the rapid development of WLANs based on IEEE 802.11 standard. Moreover, because of the advances in smartphone tethering technology, portable access points (APs) such as mobile Wi-Fi routers are being utilized ...
Ryo Hamamoto +4 more
openaire +1 more source
Mobile robotic access point for transitional optimization of wireless access point positioning
2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), 2014A mobile robotic access point (AP) is proposed to provide better wireless network environment. This AP automatically searches and moves to the best position to provide enough radio power for all devices connected to the AP. We designed the mobile robotic AP and evaluate its performance in experiment. It was found that the proposed AP can increase radio
Eisuke Nakata +2 more
openaire +1 more source
Nested Sparse Feedback Codes for Point-to-Point, Multiple Access, and Random Access Channels
2021 IEEE Information Theory Workshop (ITW), 2021This paper investigates variable-length feedback codes for discrete memoryless channels in point-to-point, multiple access, and random access communication. The proposed nested code employs L decoding times nâ‚,nâ‚‚,…,n_L for the point-to-point and multiple access channels and KL decoding times {n_(k,â„“):1 ≤ k ≤ K,1 ≤ â„“ ≤ L} for the random
Recep Can Yavas +2 more
openaire +2 more sources
"Access Points" ist die Schriftenreihe der Kolleg-Forschungsgruppe "Zugang zu kulturellen Gütern im digitalen Wandel" (KFG 33), die von der Deutschen Forschungsgemeinschaft gefördert wird. Die Kolleg-Forschungsgruppe erforscht – insbesondere am Beispiel von Kunst – sowohl die neuartigen Formen des Zugangs zu kulturellen Gütern als auch die neuen Formen
Frohne, Ursula, Schmücker, Reinold
openaire +3 more sources
Frohne, Ursula, Schmücker, Reinold
openaire +3 more sources
Counterfactuals and access points
Mind, 1999Counterfactuals seem to make factual claims about something beyond the actual course of events. The problem of counterfactuals is that there seem to be no facts beyond the actual course of events, no "counterfacts". Taking sides on the issue as it thus presents itself, we have the realist, who says that the idea that all facts are about the actual ...
openaire +1 more source
Library Review, 1981
SERIALS pose a problem for cataloguers which is essentially simple in its solution. Title entry is the obvious and most satisfactory method of entering a serial in a catalogue and has been recognised as such by modern cataloguing codes. However, a large number of serials are issued or published by corporate bodies and because cataloguing codes have ...
openaire +1 more source
SERIALS pose a problem for cataloguers which is essentially simple in its solution. Title entry is the obvious and most satisfactory method of entering a serial in a catalogue and has been recognised as such by modern cataloguing codes. However, a large number of serials are issued or published by corporate bodies and because cataloguing codes have ...
openaire +1 more source
Trajectory optimization for mobile access point
2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017We consider the problem of trajectory optimization of an Unmanned Air Vehicle (UAV) that is equipped with an wireless access point (AP) to collect data from the ground users. The goal is to find constant altitude path and velocity of the UAV during the flight time such that the weighted sum-rate of the users is maximized.
Rajeev Gangula +3 more
openaire +1 more source
Detection of wireless fake access points
2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020Wireless networks have become a common part of everyone’s life who wants to connect to the Internet network. Despite the rapid development of wireless technologies, common users still do not pay much attention to the security questions. One of the most challenging security problems of Wi-Fi networks is to detect and prevent the fake access point attack.
Norbert Lövinger +3 more
openaire +1 more source
Access Point Design with a Genetic Algorithm
2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012The interest in deploying local wireless networks has increased in the corporate environment, in recent years, as a result of several improvements in their features. Nevertheless, there are some problems caused by inadequate positions of access points (APs) which overload some cells of the total area to be covered. Some strategies of AP positioning aim
Marco Antonio S. Barbosa +1 more
openaire +1 more source

