Results 41 to 50 of about 9,784,721 (163)

Unreliable V2X Communication in Cooperative Driving: Safety Times for Emergency Braking

open access: yesIEEE Access, 2021
Cooperative driving is a promising paradigm to improve traffic efficiency and safety. In congested traffic scenarios, such cooperation allows for safe maneuvering and driving with small inter-vehicle spatial gaps.
Johan Thunberg   +4 more
doaj   +1 more source

Correlated Age-of-Information Bandits [PDF]

open access: yes2021 IEEE Wireless Communications and Networking Conference (WCNC), 2021
We consider a system composed of a sensor node tracking a time varying quantity. In every discretized time slot, the node attempts to send an update to a central monitoring station through one of K communication channels. We consider the setting where channel realizations are correlated across channels.
Juneja, Ishank   +2 more
openaire   +2 more sources

AoI-Aware Optimization of Service Caching-Assisted Offloading and Resource Allocation in Edge Cellular Networks

open access: yesSensors, 2023
The rapid development of the Internet of Things (IoT) has led to computational offloading at the edge; this is a promising paradigm for achieving intelligence everywhere.
Jialiang Feng, Jie Gong
doaj   +1 more source

DDPG-Based Throughput Optimization with AoI Constraint in Ambient Backscatter-Assisted Overlay CRN

open access: yesSensors, 2022
The combination of ambient backscatter (AB) communications (ABCs) and RF-powered cognitive radio networks (CRNs) deals with challenges of both energy supply and spectrum shortage, and improves the network performances.
Xueli Jia   +3 more
doaj   +1 more source

Conversations with chemists: information seeking behavior of chemistry faculty in the electronic age. [PDF]

open access: yes, 2002
This manuscript is a final draft of the article as submitted to the Haworth journal Science and Technology Libraries in December 2002. Due to editorial error, Haworth published an earlier draft of this paper instead of the final draft.
Flaxbart, David
core   +1 more source

Implementation and Evaluation of Age-Aware Downlink Scheduling Policies in Push-Based and Pull-Based Communication

open access: yesEntropy, 2022
As communication systems evolve to better cater to the needs of machine-type applications such as remote monitoring and networked control, advanced perspectives are required for the design of link layer protocols.
Tahir Kerem Oğuz   +3 more
doaj   +1 more source

The Governance of Genomic Information: Will It Come of Age? [PDF]

open access: yes, 2006
The completion of the Human Genome Project has opened up unprecedented possibilities in healthcare, but also ethical and social dilemmas in terms of how these can be achieved. Genomic information can be seen as a 'global public good' (GPG), in that it is
Langlois, Adele
core   +1 more source

AoI-Oriented Resource Allocation for NOMA-Based Wireless Powered Cognitive Radio Networks Based on Multi-Agent Deep Reinforcement Learning

open access: yesIEEE Access
In this paper, we study a wireless powered cognitive internet of things (IoT) network, where cognitive radio (CR) and non-orthogonal multiple access (NOMA) technologies are exploited to improve spectral efficiency, and radio frequency based energy ...
Tao He   +3 more
doaj   +1 more source

Optimization Algorithms for UAV-and-MUV Cooperative Data Collection in Wireless Sensor Networks

open access: yesDrones, 2023
The deployment of unmanned aerial vehicles (UAVs) has significantly improved the efficiency of data collection for wireless sensor networks (WSNs). The freshness of collected information from sensors can be measured by the age of information (AoI), which
Yu Lu   +4 more
doaj   +1 more source

Age-Optimal Updates of Multiple Information Flows

open access: yes, 2018
In this paper, we study an age of information minimization problem, where multiple flows of update packets are sent over multiple servers to their destinations. Two online scheduling policies are proposed. When the packet generation and arrival times are
Kompella, Sastry   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy