Sciweavers

CORR
2006
Springer
64views Education» more  CORR 2006»
13 years 5 months ago
Pseudocodeword weights for non-binary LDPC codes
Abstract-- Pseudocodewords of q-ary LDPC codes are examined and the weight of a pseudocodeword on the q-ary symmetric channel is defined. The weight definition of a pseudocodeword ...
Christine A. Kelley, Deepak Sridhara, Joachim Rose...
CORR
2006
Springer
95views Education» more  CORR 2006»
13 years 5 months ago
Optimal Distortion-Power Tradeoffs in Gaussian Sensor Networks
We investigate the optimal performance of dense sensor networks by studying the joint source-channel coding problem. The overall goal of the sensor network is to take measurements ...
Nan Liu, Sennur Ulukus
CORR
2006
Springer
90views Education» more  CORR 2006»
13 years 5 months ago
Key Distillation and the Secret-Bit Fraction
We consider distillation of secret bits from partially secret noisy correlations PABE, shared between two honest parties and an eavesdropper. The most studied distillation scenario...
Nick S. Jones, Lluis Masanes
CORR
2006
Springer
82views Education» more  CORR 2006»
13 years 5 months ago
Mapping the Bid Behavior of Conference Referees
The peer-review process, in its present form, has been repeatedly criticized. Of the many critiques ranging from publication delays to referee bias, this paper will focus specific...
Marko A. Rodriguez, Johan Bollen, Herbert Van de S...
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 5 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
CORR
2006
Springer
61views Education» more  CORR 2006»
13 years 5 months ago
An outer bound to the capacity region of the broadcast channel
An outer bound to the capacity region of the two-receiver discrete memoryless broadcast channel is given. The outer bound is tight for all cases where the capacity region is known....
Chandra Nair, Abbas El Gamal
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 5 months ago
Restricted Strip Covering and the Sensor Cover Problem
Suppose we are given a set of objects that cover a region and a duration associated with each object. Viewing the objects as jobs, can we schedule their beginning times to maximiz...
Adam L. Buchsbaum, Alon Efrat, Shaili Jain, Suresh...
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 5 months ago
Network Inference from Co-Occurrences
The study of networked systems is an emerging field, impacting almost every area of engineering and science, including the important domains of communication systems, biology, soc...
Michael Rabbat, Mário A. T. Figueiredo, Rob...
CORR
2006
Springer
95views Education» more  CORR 2006»
13 years 5 months ago
Prefix Coding under Siege
A novel lossless source coding paradigm applies to problems in which a vital message needs to be transmitted prior to termination of communications, as in Alfr
Michael B. Baer
CORR
2006
Springer
94views Education» more  CORR 2006»
13 years 5 months ago
Single-Symbol-Decodable Differential Space-Time Modulation Based on QO-STBC
We show that Minimum-Decoding-Complexity QuasiOrthogonal Space-Time Block Code (MDC-QOSTBC) can be used to form a new differential space-time modulation (DSTM) scheme to provide f...
Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung