Sciweavers

634 search results - page 127 / 127
» Groundwork for Weak Analysis
Sort
View
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 10 days ago
New Results on the Capacity of the Gaussian Cognitive Interference Channel
The capacity of the two-user Gaussian cognitive interference channel, a variation of the classical interference channel where one of the transmitters has knowledge of both messages...
Stefano Rini, Daniela Tuninetti, Natasha Devroye
JSAC
2011
219views more  JSAC 2011»
13 years 7 days ago
Detection of Small-Scale Primary Users in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices, such as wireless microphones, is a challenging, but very important, problem that has not yet be...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
SOICT
2010
13 years 2 days ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
SODA
1992
ACM
123views Algorithms» more  SODA 1992»
13 years 6 months ago
Computing Minimal Spanning Subgraphs in Linear Time
Let P be a property of undirected graphs. We consider the following problem: given a graph G that has property P, nd a minimal spanning subgraph of G with property P. We describe ...
Xiaofeng Han, Pierre Kelsen, Vijaya Ramachandran, ...