Sciweavers

CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 5 months ago
Proposing a New Method for Query Processing Adaption in DataBase
Mohammad-Reza Feizi-Derakhshi, Hasan Asil, Amir As...
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 5 months ago
Dirty Paper Coding using Sign-bit Shaping and LDPC Codes
Dirty paper coding (DPC) refers to methods for pre-subtraction of known interference at the transmitter of a multiuser communication system. There are numerous applications for DPC...
G. Shilpa, Andrew Thangaraj, Srikrishna Bhashyam
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 5 months ago
Relay Assisted Cooperative OSTBC Communication with SNR Imbalance and Channel Estimation Errors
In this paper, a two-hop relay assisted cooperative Orthogonal Space-Time Block Codes (OSTBC) transmission scheme is considered for the downlink communication of a cellular system,...
Bo Niu, Mihaela C. Beluri, Zinan Lin, Prabhakar Ch...
CORR
2010
Springer
166views Education» more  CORR 2010»
13 years 5 months ago
Software Metrics Evaluation Based on Entropy
Abstract. Software engineering activities in the Industry has come a long way with various improvements brought in various stages of the software development life cycle. The comple...
R. Selvarani, T. R. Gopalakrishnan Nair, Muthu Ram...
CORR
2010
Springer
166views Education» more  CORR 2010»
13 years 5 months ago
The dynamics of message passing on dense graphs, with applications to compressed sensing
`Approximate message passing' algorithms proved to be extremely effective in reconstructing sparse signals from a small number of incoherent linear measurements. Extensive num...
Mohsen Bayati, Andrea Montanari
CORR
2010
Springer
61views Education» more  CORR 2010»
13 years 5 months ago
Approximate Privacy: PARs for Set Problems
Joan Feigenbaum, Aaron D. Jaggard, Michael Schapir...
CORR
2010
Springer
59views Education» more  CORR 2010»
13 years 5 months ago
Linear Recursion
Sandra Alves, Maribel Fernández, Már...
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 5 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 5 months ago
Gaussian MIMO Broadcast Channels with Common and Confidential Messages
We study the two-user Gaussian multiple-input multiple-output (MIMO) broadcast channel with common and confidential messages. In this channel, the transmitter sends a common messag...
Ersen Ekrem, Sennur Ulukus
CORR
2010
Springer
388views Education» more  CORR 2010»
13 years 5 months ago
Research Challenges for Enterprise Cloud Computing
Cloud computing represents a shift away from computing as a product that is purchased, to computing as a service that is delivered to consumers over the internet from large-scale ...
Ali Khajeh-Hosseini, Ian Sommerville, Ilango Srira...