Results 41 to 50 of about 15,517 (207)

Coordinated Multicasting with Opportunistic User Selection in Multicell Wireless Systems

open access: yes, 2015
Physical layer multicasting with opportunistic user selection (OUS) is examined for multicell multi-antenna wireless systems. By adopting a two-layer encoding scheme, a rate-adaptive channel code is applied in each fading block to enable successful ...
Chang, Tsung-Hui   +3 more
core   +1 more source

Fundamental Limits of Caching [PDF]

open access: yes, 2014
Caching is a technique to reduce peak traffic rates by prefetching popular content into memories at the end users. Conventionally, these memories are used to deliver requested content in part from a locally cached copy rather than through the network ...
Maddah-Ali, Mohammad Ali, Niesen, Urs
core   +1 more source

Generation of Multichannel Delayed Pulses by Four-Wave-Mixing-Assisted Stimulated Brillouin Scattering Slow-Light System

open access: yesIEEE Photonics Journal, 2012
We demonstrate a technique to simultaneously generate multiple delayed signals through four-wave mixing (FWM) wavelength multicasting in a single-pump stimulated Brillouin scattering (SBS)-based slow-light system. The signal delay is achieved with an SBS
Liang Wang   +3 more
doaj   +1 more source

On the Empirical Evaluation of Multicasting with Minimum Delay Variation [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2016
In certain types of Internet applications, multicasting with Quality of Service (QoS) optimizations are required on both the end-to-end delay from the source to the destinations, as well as the difference in the end-to-end delay between the destinations.
Nicklaus Rhodes, Shankar Banik
doaj   +1 more source

Rate-Splitting for Max-Min Fair Multigroup Multicast Beamforming in Overloaded Systems [PDF]

open access: yes, 2017
In this paper, we consider the problem of achieving max-min fairness amongst multiple co-channel multicast groups through transmit beamforming. We explicitly focus on overloaded scenarios in which the number of transmitting antennas is insufficient to ...
Clerckx, Bruno, Joudeh, Hamdi
core   +2 more sources

Multicast snooping: a new coherence method using a multicast address network [PDF]

open access: yesProceedings of the 26th International Symposium on Computer Architecture (Cat. No.99CB36367), 1999
This paper proposes a new coherence method called "multicast snooping" that dynamically adapts between broadcast snooping and a directory protocol. Multicast snooping is unique because processors predict which caches should snoop each coherence transaction by specifying a multicast "mask." Transactions are delivered
E. Ender Bilir   +6 more
openaire   +1 more source

Throughput Bound of XOR Coded Wireless Multicasting to Three Clients

open access: yes, 2015
It is a well-known result that constructing codewords over $GF(2)$ to minimize the number of transmissions for a single-hop wireless multicasting is an NP-complete problem. Linearly independent codewords can be constructed in polynomial time for all the $
Malik, Adeel, Qureshi, Jalaluddin
core   +1 more source

3D As‐Built Environments in Extended Reality Applications: A Systematic Review

open access: yesThe Photogrammetric Record, Volume 41, Issue 194, April/June 2026.
This systematic review identifies BIM and game engines as the primary tools for integrating 3D as‐built environments into XR. While multi‐sensor fusion and multimodal interaction enhance immersion, persistent challenges like manual modeling and bandwidth limitations continue to hinder full ecosystem maturation.
Jesús Balado   +4 more
wiley   +1 more source

Weighted Fair Multicast Multigroup Beamforming under Per-antenna Power Constraints [PDF]

open access: yes, 2014
A multi-antenna transmitter that conveys independent sets of common data to distinct groups of users is considered. This model is known as physical layer multicasting to multiple co-channel groups.
Chatzinotas, Symeon   +2 more
core   +2 more sources

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy