... scheme in this subsection. For gaining insight
into the power allocation based on minimizing the SER, we
are going to minimize the approximate MGF of the random
variable γ, obtained in (51). Using ... Relaying through AF DSTC
In this section, we propose power allocation schemes for
the AF distributed space-time codes introduced in [7], based
on maximizing the receive...
... Fixed Point Theory and
Applications, vol. 2009, Article ID 487161, 9 pages, 2009.
10 Fixed Point Theory and Applications
ii for any x ∈ X, there exists y ∈ T x satisfying the following conditions:
μ
ω
x, ... Tx is lower semicontinuous.
Note that Theorem 1.3 generalizes Nadler’s contraction principle and Theorem 1.2.
Most recently, Ciric 4 obtained some interesting fixed point...
... links between the sources
and destinations and there are two dedicated relays (one for
each source-destination pair) implementing DF. The power
allocation game consists in sharing the user’s power ... non-coordinated and interfering pairs
of terminals. For example, relays could be introduced by
an operator aiming at improving the performance of the
communications of his customers....
... 2.32
Hindawi Publishing Corporation
Fixed Point Theory and Applications
Volume 2010, Article ID 183596, 13 pages
doi:10.1155/2010/183596
Research Article
Fixed Point Theorems for ws-Compact Mappings ... continue the study of ws-compact mappings, investigate the boundary conditions,
and establish new fixed point theorems. Specifically, we prove several fixed point theorems
for ws-comp...
... Hires. For this
Hindawi Publishing Corporation
EURASIP Journal on Advances in Signal Processing
Volume 2009, Article ID 531213, 20 pages
doi:10.1155/2009/531213
Research Article
Signal Processing Strategies ... M.
(37)
The spreading function has been defined in the nonlinear
frequency domain, that is, in the analysis band domain z.As
the sinusoids are extracted in the uniform...
... is
modeled in different ways in literature, such as exponentially
distributed [16, 22] and uniformly distributed [24]. In this
article, we model it as a uniformly distributed random
variable ranging ... programming
approach to NLOS error mitigation in sensor networks,” in
Proceedings of the 5th International Conference on Informa-
tion Processing in Sensor Networks (IPSN ’06...
... Wornell, “Quantization index modulation:
a class of provably good methods for digital watermarking
and information embedding,” in Proceedings of the IEEE
International Symposium on Information Theory ... Nguyen, “Protecting and managing privacy information
in video surveillance systems,” in Protecting Privacy in Video
Surveillance, Springer, New York, NY, USA, 2009.
16 EURASIP Journ...
... b1.1
is a continuous function satisfying the following properties:
afx, y is nondecreasing in x ∈ a, b for each y ∈ a, b, and fx, y is nonincreasing in
y ∈ a, b for each x ∈ a, ... been
included in 14 and applied successfully to some boundary value problems in ordinary
differential equations.
Hindawi Publishing Corporation
Fixed Point Theory and Applications
Volum...
... unidirectional links in AODV have been pro-
posed in [17]. However, before explaining these techniques,
it is worth pointing out how AODV originally establishes
valid routes exploiting unidirectional links.
Let ... pages
doi:10.1155/2007/19375
Research Article
Effects of Unstable Links on AODV Performance in
Real Testbeds
Eleonora Borgia and Franca Delmastro
Pervasive Computing and...
... “Performance
analysis for orthogonal space-time block codes in the absence
of perfect channel state information,” in Proceedings of the 14th
IEEE International Symposium on Personal, Indoor and Mobile
Radio ... Hong, “Performance analysis of space-time
block codes in time-varying Rayleigh fading channels,” in Pro-
ceedings of IEEE International Conference on Acoustics, Speec...