Sciweavers

CISS
2010
IEEE
12 years 7 months ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
CISS
2010
IEEE
12 years 7 months ago
Real-time video quality monitoring for mobile devices
Due to the explosion of various video applications and services it is becoming increasingly important to accurately measure video quality in real-time. Since reference information...
Tao Liu, G. Cash, Wen Chen, Chunhua Chen, Jeffrey ...
CISS
2010
IEEE
12 years 7 months ago
Unconstrained minimization of quadratic functions via min-sum
—Gaussian belief propagation is an iterative algorithm for computing the mean of a multivariate Gaussian distribution. Equivalently, the min-sum algorithm can be used to compute ...
Nicholas Ruozzi, Sekhar Tatikonda
CISS
2010
IEEE
12 years 7 months ago
On Gaussian MIMO compound wiretap channels
— We study the two-user one-eavesdropper discrete memoryless compound wiretap channel, where the transmitter sends a common confidential message to both users, which needs to be...
Ersen Ekrem, Sennur Ulukus
CISS
2010
IEEE
12 years 7 months ago
On the LASSO and Dantzig selector equivalence
—Recovery of sparse signals from noisy observations is a problem that arises in many information processing contexts. LASSO and the Dantzig selector (DS) are two well-known schem...
Muhammad Salman Asif, Justin K. Romberg
CISS
2010
IEEE
12 years 7 months ago
Retrodirective distributed transmit beamforming with two-way source synchronization
—Distributed transmit beamforming has recently been proposed as a technique in which several single-antenna sources cooperate to form a virtual antenna array and simultaneously t...
Robert D. Preuss, D. Richard Brown
CISS
2010
IEEE
12 years 7 months ago
On models for multi-user Gaussian channels with fading
Abstract— An analytically tractable model for Gaussian multiuser channels with fading is studied, and the capacity region of this model is found to be a good approximation of the...
Rony El Haddad, Brian Smith, Sriram Vishwanath
CISS
2010
IEEE
12 years 7 months ago
Frame permutation quantization
—Frame permutation quantization (FPQ) is a new vector quantization technique using finite frames. In FPQ, a vector is encoded using a permutation source code to quantize its fra...
Ha Quy Nguyen, Vivek K. Goyal, Lav R. Varshney
CISS
2010
IEEE
12 years 7 months ago
On the symmetric capacity of the K-user symmetric cyclic Gaussian interference channel
Abstract—The capacity region of Gaussian interference channel in the weak interference regime is an open problem. Recently, Etkin, Tse and Wang derived an outer bound for the two...
Lei Zhou, Wei Yu
CISS
2010
IEEE
12 years 7 months ago
The maximum stable broadcast throughput for wireless line networks with network coding and topology control
—We consider broadcasting from a single source to multiple destinations in a linear wireless erasure network with feedback. The problem is to find the maximum stable throughput ...
Ka-Hung Hui, Yalin Evren Sagduyu, Dongning Guo, Ra...