Academic literature on the topic 'Tradeoff bandwidth'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Tradeoff bandwidth.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Tradeoff bandwidth"

1

Avitzour, D. "SNR/bandwidth tradeoff in coherent radar sampling." IEEE Transactions on Aerospace and Electronic Systems 26, no. 2 (March 1990): 403–5. http://dx.doi.org/10.1109/7.53447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Akhlaghi, Soroush, Abbas Kiani, and Mohammad Reza Ghanavati. "Cost-bandwidth tradeoff in distributed storage systems." Computer Communications 33, no. 17 (November 2010): 2105–15. http://dx.doi.org/10.1016/j.comcom.2010.07.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kleinrock, L. "The latency/bandwidth tradeoff in gigabit networks." IEEE Communications Magazine 30, no. 4 (April 1992): 36–40. http://dx.doi.org/10.1109/35.135787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Li, Yuan Feng, Baochun Li, and Bo Li. "Efficient Performance-Centric Bandwidth Allocation with Fairness Tradeoff." IEEE Transactions on Parallel and Distributed Systems 29, no. 8 (August 1, 2018): 1693–706. http://dx.doi.org/10.1109/tpds.2018.2808202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Barakat, Chadi, and Eitan Altman. "Bandwidth tradeoff between TCP and link-level FEC." Computer Networks 39, no. 2 (June 2002): 133–50. http://dx.doi.org/10.1016/s1389-1286(01)00305-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sanders, Peter, and Jop F. Sibeyn. "A bandwidth latency tradeoff for broadcast and reduction." Information Processing Letters 86, no. 1 (April 2003): 33–38. http://dx.doi.org/10.1016/s0020-0190(02)00473-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Oyman, Ozgur, and Arogyaswami Paulraj. "Power-Bandwidth Tradeoff in Dense Multi-Antenna Relay Networks." IEEE Transactions on Wireless Communications 6, no. 6 (June 2007): 2282–93. http://dx.doi.org/10.1109/twc.2007.05815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sirleto, L., M. A. Ferrara, and A. Vergara. "Toward an ideal nanomaterial for on-chip Raman laser." Journal of Nonlinear Optical Physics & Materials 26, no. 03 (September 2017): 1750039. http://dx.doi.org/10.1142/s0218863517500394.

Full text
Abstract:
One of the most important applications of stimulated Raman scattering (SRS) is the realization of amplifiers or laser sources in bulk materials, in fiber and in integrated optic format as well. We note that, as a general rule, in all laser gain bulk materials, there is a tradeoff between gain and bandwidth: line width may be increased at the expense of peak gain. This tradeoff is a fundamental limitation toward the realization of micro/nano-sources with large emission spectra. In this paper, in order to clarify the possibility of obtaining new materials with both large Raman gain coefficients and spectral bandwidth, SRS investigations in nanostructures, spanning from nanometrically heterogeneous K2O–Nb2O5SiO2 (KNS) glasses to Si nanocrystals, are reported and discussed.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Mingfei, Yunlong Hu, and Jia Song. "Improved Fractional-Order Extended State Observer-Based Hypersonic Vehicle Active Disturbance Rejection Control." Mathematics 10, no. 23 (November 23, 2022): 4414. http://dx.doi.org/10.3390/math10234414.

Full text
Abstract:
In this work, a novel fractional-order extended state observer (FOESO)-based linear active disturbance rejection control (LADRC) method is firstly proposed for a hypersonic vehicle (HV) to address the measurement noise problem. The uncertainty and external disturbance of an HV was discussed and addressed by the active disturbance rejection control and many different control methods in recent decades. However, the research of an HV with measurement noise is insufficient. For the LADRC, the anti-noise ability is highly dependent on the bandwidth of the extended state observer (ESO). Meanwhile, the control performance of the LADRC is relevant to the bandwidth. The FOESO is presented, aiming to address the tradeoff of the control performance or noise suppression. The FOESO-based LADRC (FOESO-LADRC) introduces fractional calculus. It can enhance the anti-noise ability with little influence on the control performance. The simulation results show that the FOESO-LADRC has a significant improvement in the noise suppression. In addition, compared with the LADRC, it obtains a better solution to address the tradeoff between the bandwidth and noise impact.
APA, Harvard, Vancouver, ISO, and other styles
10

Tamoor-ul-Hassan, Syed, Mehdi Bennis, Pedro H. J. Nardelli, and Matti Latva-aho. "Caching in Wireless Small Cell Networks: A Storage-Bandwidth Tradeoff." IEEE Communications Letters 20, no. 6 (June 2016): 1175–78. http://dx.doi.org/10.1109/lcomm.2016.2543698.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Tradeoff bandwidth"

1

Zhao, Qinghua. "Bandwidth allocation and tradeoffs of source coding, channel coding and spreading in CDMA systems /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2004. http://wwwlib.umi.com/cr/ucsd/fullcit?p3137223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Benkirane, Nada. "La gestion du trafic dans les réseaux orientés contenus." Electronic Thesis or Diss., Paris 6, 2014. http://www.theses.fr/2014PA066039.

Full text
Abstract:
Les réseaux orientés contenus (CCN) ont été créés afin d'optimiser les ressources réseau et assurer une plus grande sécurité. Le design et l'implémentation de cette architecture est encore à ces débuts. Ce travail de thèse présente des propositions pour la gestion de trafic dans les réseaux du future. Il est nécessaire d'ajouter des mécanismes de contrôle concernant le partage de la bande passante entre flots. Le contrôle de trafic est nécessaire pour assurer un temps de latence faible pour les flux de streaming vidéo ou audio, et pour partager équitablement la bande passante entre flux élastiques. Nous proposons un mécanisme d'Interest Discard pour les réseaux CCN afin d'optimiser l'utilisation de la bande passante. Les CCN favorisant l'utilisation de plusieurs sources pour télécharger un contenu, nous étudions les performances des Multipaths/ Multisources; on remarque alors que leurs performances dépendent des performances de caches.Dans la deuxième partie de cette thèse, nous évaluons les performances de caches en utilisant une approximation simple et précise pour les caches LRU. Les performances des caches dépendent fortement de la popularité des objets et de la taille des catalogues. Ainsi, Nous avons évalué les performances des caches en utilisant des popularités et des catalogues représentant les données réelles échangées sur Internet. Aussi, nous avons observé que les tailles de caches doivent être très grandes pour assurer une réduction significative de la bande passante; ce qui pourrait être contraignant pour l'implémentation des caches dans les routeurs. Nous pensons que la distribution des caches devrait répondre à un compromis bande passante/mémoire ; la distribution adoptée devrait réaliser un coût minimum. Pour ce faire, nous évaluons les différences de coût entre architectures
Content Centric Network (CCN) architecture has been designed to optimize network resources and ensure greater security. The design and the implementation of this architecture are only in its beginning. This work has made some proposals in traffic management related to the internet of the future.We argue that it is necessary to supplement CCN with mechanisms enabling controlled sharing of network bandwidth by competitive flows. Traffic control is necessary to ensure low latency for conversational and streaming flows, and to realize satisfactory bandwidth sharing between elastic flows. These objectives can be realized using "per-flow bandwidth sharing". As the bandwidth sharing algorithms in the IP architecture are not completely satisfactory, we proposed the Interest Discard as a new technique for CCN. We tested some of the mechanisms using CCNx prototype software and simulations. In evaluating the performance of multi-paths we noted the role of cache performance in the choice of selected paths.In the second part, we evaluate the performance of caches using a simple approximation for LRU cache performance that proves highly accurate. As caches performance heavily depends on populations and catalogs sizes, we evaluate their performance using popularity and catalogs representing the current Internet exchanges. Considering alpha values, we observe that the cache size should be very large, which can be restrictive for caches implementation in routers.We believe that the distribution of caches on an architecture creates an excessive bandwidth consumption. Then, it is important to determine a tradeoff bandwidth/memory to determine how we should size caches and where we should place them, this amounts to evaluate differences, in cost, between architectures
APA, Harvard, Vancouver, ISO, and other styles
3

Birenjith, P. S. "High-rate MSR Codes, Interior-point Regenerating Codes, and Codes with Hierarchical Locality." Thesis, 2017. http://etd.iisc.ac.in/handle/2005/4293.

Full text
Abstract:
Given the breath-taking pace at which the amount of data being generated on a daily basis is growing, and the keen desire to extract information from this data, there is strong interest within the storage industry, at finding means to efficiently and reliably store this data. Given that individual storage units are prone to failure, data pertaining to a single _le is distributed across storage nodes. Such storage of `Big Data' across a spatially distributed network of nodes, calls for codes than can efficiently handle the issue of node repair. The need for node repair could arise on account of device failure, need for a maintenance reboot, or simply because the node is busy serving other demands. A new branch of coding theory has sprung up in response. Regenerating codes minimize data download during a repair operation, while codes with locality ensure that local operations suffice for node repair. The present thesis makes contributions to both regenerating codes as well as codes with locality. While the reliable storage of data in disks with minimum storage overhead is a well-studied problem, the problem of node repair is relatively new. From the viewpoint of the storage industry, the cost to repair a failed node can be measured in two distinct ways: firstly, in terms of the number of surviving nodes accessed, and secondly, in terms of the amount of data transmitted over the network to ensure repair of the failed node. In a regenerating code having parameter set (n; k; d; (_; _);B), and over a _finite _field Fq, a file consisting of B symbols from Fq is encoded into n_ symbols, and the coded symbols are stored in n distinct nodes, each node storing _ symbols. The parameter _ is referred to as sub-packetization level. The entire _le can be recovered from downloading k_ symbols from any set of k nodes. Under the exact-repair (ER) setting that is of interest here, the contents of a failed node are repaired exactly from a total of d_ symbols downloaded from any d helper nodes, each helper node transmitting _ symbols. In the alternative setting of functional repair (FR), the contents of the replacement node can be different from that of the failed node, however, following node repair, the new configuration is still required to satisfy the data-recovery and node repair properties of a regenerating code. Under the FR setting, there is a trade-off known as storage-repair-bandwidth (S-RB) trade-off between the values of _ and d_, that optimize the size of the _le being stored. The two extreme points of the trade-off, one corresponding to the minimum possible value of _ and the other, to the minimum possible value of d_, are known as the minimum-storage-regenerating (MSR) and minimum-bandwidth-regenerating (MBR) points respectively. It has been shown that the extreme points of the ER trade-off coincide with those of the FR trade-off. However, the characterization of trade-off in the case of ER remains an open and challenging problem. High-rate MSR code constructions the _first problem reported in the thesis, is one of designing exact-repair MSR codes that possess certain additional desirable properties, namely, high rate (i.e., rate greater than half) and a small value of sub-packetization level _. In the present thesis, we construct a family of MSR codes for d = (n 􀀀 1) having a fixed rational rate R = (t 􀀀 1)=t and a sub-packetization that is polynomial in k for a fixed rate. In the construction, _ varies with k as _ = O(kt). This was the first high-rate MSR code construction to have such small value of sub-packetization. Canonical codes: Regenerating codes for the interior points of the S-RB trade-off the next pair of results relate to the construction of interior-point regenerating codes. For the parameter set (n; k; d = k), we first construct as our second result, a class of codes referred to as canonical codes, having an auxiliary parameter w, with w in the range n􀀀k < w < k, these codes operate in the region between the MSR point and the MBR point, and perform significantly better than operating points obtained through space-sharing. The canonical code constructed for the case (n; k = n 􀀀 1; d = n 􀀀 1), turn out to achieve an interior point of the FR trade-off, thus characterizing for the first time, an interior point of the ER trade-off. Generalized Canonical codes We next build on top of a canonical code having parameters (n; d; d) and construct codes corresponding to a more general parameter set of the form (n; k < d; d) using two different approaches. In the first approach, leading to what we refer to as non-canonical codes, an exponential expansion in field size is needed while the parameters _ and _ remain the same as in the case of the (n; d; d) code. In the second approach, the value of _ is increased from that of the (n; d; d) code, but no expansion in field size is needed. The resultant codes are referred to as improved layered codes. Both approaches lead to codes that perform much better than the space-sharing line. Outer bounds on the storage-repair-bandwidth trade-off the next set of results presented here take on the form of two distinct outer bounds for the S-RB trade-off. The first is referred to here as the repair-matrix bound and the second as the improved Muhajir-Tandon bound. The repair-matrix bound lies strictly away from the FR trade-off for every parameter (n; k; d), and thus proves that the ER trade-off is bounded away from the FR trade-off, even when the _le size grows to infinity. This result solved an open problem in the literature. In conjunction with the improved layered codes constructed in the thesis and described above, these outer bounds characterize the ER trade-off for the case when (n; k = 3; d = n 􀀀 1). This is the first family of parameters for which the ER trade-off is characterized. Furthermore, for the parameter set (n; k = 4; d = n 􀀀 1), the operating point of the improved layered code coincides with the outer bound, characterizing yet another interior point of the S-RB trade-off. Codes with hierarchical locality the final set of results relate to the second class of codes developed for efficient node repair, namely, codes with locality. The aim of this class of codes is to reduce the number of nodes accessed while repairing a failed node. In a code with locality having locality parameter r, every symbol can be repaired by accessing r other symbols, where r is typically, much smaller than the dimension k of the code. We introduce in the thesis the notion of hierarchical locality, where the local codes are of varying locality and possess a hierarchical structure. In the case of two-level hierarchical locality, for instance, every symbol is protected both by an inner, short-block-length local code, as well as a middle code of larger block length. The code symbols in the inner code are a subset of the code symbols in the middle code. We first present the case of codes with two-level hierarchy, derive an upper bound on the minimum distance and provide optimal code constructions for a wide parameter range. The minimum-distance bound, and code construction are then generalized for the case of a hierarchical structure having an arbitrary number of levels.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Tradeoff bandwidth"

1

Sanders, Peter, and Jop F. Sibeyn. "A Bandwidth Latency Tradeoff for Broadcast and Reduction." In Euro-Par 2000 Parallel Processing, 918–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44520-x_128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barakat, Chadi, and Eitan Altman. "Bandwidth Tradeoff between TCP and Link–Level FEC." In Networking — ICN 2001, 97–107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-47734-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yin, Wenshan, Pinyi Ren, and Shuangcheng Yan. "Throughput and Sensing Bandwidth Tradeoff in Cognitive Radio Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 12–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30493-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tulino, Antonia, Angel Lozano, and Sergio Verdú. "Bandwidth-power tradeoff of multi-antenna systems in the low-power regime." In DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 15–41. Providence, Rhode Island: American Mathematical Society, 2003. http://dx.doi.org/10.1090/dimacs/062/02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nazim, Abdeddaim, Darties Benot, and Theoleyre Fabrice. "Bandwidth and Energy Consumption Tradeoff for IEEE 802.15.4 in Multihop Topologies." In Wireless Sensor Networks - Technology and Applications. InTech, 2012. http://dx.doi.org/10.5772/48295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Arora, Shaifali Madan, and Kavita Khanna. "Block-Based Motion Estimation." In Research Anthology on Recent Trends, Tools, and Implications of Computer Programming, 651–76. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3016-0.ch029.

Full text
Abstract:
Recent years have witnessed a great technological evolution in video display and capturing technologies leading to the development of new standards of video coding including MPEG-X, H.26X and HEVC. The cost of computations, storage and high bandwidth requirements makes a video data expensive in terms of transmission and storage. This makes video compression absolutely necessary prior to its transmission in order to accommodate for different transmission media's capabilities. Digital video compression technologies therefore have become an important part of the way we create, present, communicate and use visual information. The main aim behind a video compression system is to eliminate the redundancies from a raw video signal. The tradeoff involved in the process of video compression is between the speed, quality and resource utilization. The current chapter explores the techniques, challenges, issues and problems in video compression in detail along with the major advancements in the field.
APA, Harvard, Vancouver, ISO, and other styles
7

Guan, Sheng-Uei. "Mobile Agent Authentication and Authorization." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 930–37. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch126.

Full text
Abstract:
With the increasing usage of the Internet, electronic commerce (e-commerce) has been catching on fast in a lot of business areas. As e-commerce booms, there comes a demand for a better system to manage and carry out transactions. This leads to the development of agent-based e-commerce. In this new approach, agents are employed on behalf of users to carry out various e-commerce activities. Although the tradeoff of employing mobile agents is still under debate (Milojicic, 1999), using mobile agents in e-commerce attracts much research effort, as it may improve the potential of their applications in e-commerce (Guan & Yang, 1999, 2004). One advantage of using agents is that communication cost can be reduced. Agents traveling and transferring only necessary information saves network bandwidth and reduces the chances of network congestion. Also, users can schedule their agents to travel asynchronously to the destinations and collect information or execute other applications, while they can disconnect from the network (Wong, Paciorek, & Moore, 1999). Although agent-based technology offers such advantages, the major factor holding people back from employing agents is still the security issues involved. On one hand, hosts cannot trust incoming agents belonging to unknown owners, because malicious agents may launch attacks on the hosts and other agents. On the other hand, agents may also have concerns on the reliability of hosts and will be reluctant to expose their secrets to distrustful hosts. To build bilateral trust in an e-commerce environment, the authorization and authentication schemes for mobile agents should be designed well. Authentication checks the credentials of an agent before processing an agent’s requests. If the agent is found to be suspicious, the host may decide to deny its service requests. Authorization refers to the permissions granted for the agent to access whichever resources it requested.
APA, Harvard, Vancouver, ISO, and other styles
8

Sabban, Albert. "Green Wearable Sensors for Medical, Energy Harvesting, Communication, and IoT Systems." In Advances in Green Electronics Technologies 2023 [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.112352.

Full text
Abstract:
This chapter presents novel passive and active wearable sensors for biomedical systems, energy harvesting, and communication devices. Design tradeoffs, simulation, and measured results of compact efficient sensors for communication, energy harvesting, IoT, and healthcare systems are discussed in this chapter. The new sensors are green sensors with an energy harvesting unit. The sensor electrical parameters near the human body were evaluated by employing RF CAD software. The sensors are flexible passive and active devices with high efficiency and low cost. Low-cost sensor may be developed by printing the printed antenna with the antenna feed network and the active components on the same board. Efficient metamaterial sensors were developed to improve the system electrical performance. The resonant frequency range of the sensors, with Circular Split-Ring Resonators CSRRs, is lower by 5% to 11% than the sensors with CSRRs. The directivity and gain of the sensors with CSRRs are higher by 2.5dB than the sensors without CSRRs. For S11 lower than –6 dB, the bandwidth of the novel metamaterial sensors may be around 15 to 55%. The directivity and gain of the new metamaterial sensors are around 5 dBi to 7.5 dBi. The receiving active sensor gain is 12 ± 3 dB. The transmitting active sensor gain is 13 ± 3 dB.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Tradeoff bandwidth"

1

Zhang, Shunqing, and Shugong Xu. "On the Bandwidth-Power Tradeoff for Heterogeneous Wireless Networks with Orthogonal Bandwidth Allocation." In 2012 IEEE Vehicular Technology Conference (VTC 2012-Spring). IEEE, 2012. http://dx.doi.org/10.1109/vetecs.2012.6240217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bae, Changhun, and Wayne E. Stark. "On the energy-bandwidth tradeoff for AWGN relay channels." In MILCOM 2009 - 2009 IEEE Military Communications Conference. IEEE, 2009. http://dx.doi.org/10.1109/milcom.2009.5379793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bae, Changhun, and Wayne E. Stark. "A Tradeoff between Energy and Bandwidth Efficiency in Wireless Networks." In MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4454915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oyman, Ozgur, and Moe Z. Win. "Power-bandwidth tradeoff in multiuser relay channels with opportunistic scheduling." In 2008 46th Annual Allerton Conference on Communication, Control, and Computing. IEEE, 2008. http://dx.doi.org/10.1109/allerton.2008.4797538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bai, Bo, Wei Chen, Zhigang Cao, and Khaled B. Letaief. "Diversity-Multiplexing Tradeoff in OFDMA Systems with Coherence Bandwidth Splitting." In GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. IEEE, 2009. http://dx.doi.org/10.1109/glocom.2009.5425767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oyman, Ozgur, and Sumeet Sandhu. "Non-Ergodic Power-Bandwidth Tradeoff in Linear Multi-hop Networks." In 2006 IEEE International Symposium on Information Theory. IEEE, 2006. http://dx.doi.org/10.1109/isit.2006.262121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Roberts, James, and Nada Sbihi. "Exploring the memory-bandwidth tradeoff in an information-centric network." In 2013 25th International Teletraffic Congress (ITC 2013). IEEE, 2013. http://dx.doi.org/10.1109/itc.2013.6662936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shpiner, Alexander, Eitan Zahavi, and Ori Rottenstreich. "The Buffer Size vs Link Bandwidth Tradeoff in Lossless Networks." In 2014 IEEE 22nd Annual Symposium on High-Performance Interconnects (HOTI). IEEE, 2014. http://dx.doi.org/10.1109/hoti.2014.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dagher, Joseph, and Ali Bilgin. "A field map estimation strategy without the noise-bandwidth tradeoff." In SPIE Medical Imaging, edited by David R. Haynor and Sébastien Ourselin. SPIE, 2012. http://dx.doi.org/10.1117/12.911026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bae, Changhun, and Wayne E. Stark. "Energy-bandwidth tradeoff with spatial reuse in wireless multi-hop networks." In MILCOM 2008 - 2008 IEEE Military Communications Conference (MILCOM). IEEE, 2008. http://dx.doi.org/10.1109/milcom.2008.4753569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography