Sciweavers

82 search results - page 3 / 17
» Distributed Estimation Via Random Access
Sort
View
INFOCOM
2007
IEEE
13 years 11 months ago
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization
—The implementation of distributed network utility maximization (NUM) algorithms hinges heavily on information feedback through message passing among network elements. In practic...
Junshan Zhang, Dong Zheng, Mung Chiang
INFOCOM
2008
IEEE
13 years 11 months ago
Capacity of Asynchronous Random-Access Scheduling in Wireless Networks
Abstract—We study the throughput capacity of wireless networks which employ (asynchronous) random-access scheduling as opposed to deterministic scheduling. The central question w...
Deepti Chafekar, Dave Levin, V. S. Anil Kumar, Mad...
INFOCOM
2008
IEEE
13 years 11 months ago
Wireless Medium Access via Adaptive Backoff: Delay and Loss Minimization
— We consider packet transmission scheduling at the MAC-layer via adaptive backoff algorithms that are favorable in terms of queue occupancies in a wireless network. General netw...
Gardar Hauksson, Murat Alanyali
AICT
2006
IEEE
129views Communications» more  AICT 2006»
13 years 9 months ago
Stochastic Thresholding: An approach to Estimator Optimization via Fisher Information Maximization
In stochastic thresholding, the threshold for quantization of a signal is randomized. An estimator based on quantized signal data can be optimized through stochastic thresholding. ...
Samudra Dasgupta
ICIP
2008
IEEE
14 years 7 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...