Sciweavers

7168 search results - page 1427 / 1434
» A Factorization Approach to Grouping
Sort
View
JSAC
2011
219views more  JSAC 2011»
14 years 4 months ago
Detection of Small-Scale Primary Users in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices, such as wireless microphones, is a challenging, but very important, problem that has not yet be...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
JMLR
2010
179views more  JMLR 2010»
14 years 4 months ago
PAC-Bayesian Analysis of Co-clustering and Beyond
We derive PAC-Bayesian generalization bounds for supervised and unsupervised learning models based on clustering, such as co-clustering, matrix tri-factorization, graphical models...
Yevgeny Seldin, Naftali Tishby
SOICT
2010
14 years 4 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
TIT
2010
143views Education» more  TIT 2010»
14 years 4 months ago
Asynchronous CDMA systems with random spreading-part I: fundamental limits
Spectral efficiency for asynchronous code division multiple access (CDMA) with random spreading is calculated in the large system limit. We allow for arbitrary chip waveforms and ...
Laura Cottatellucci, Ralf R. Müller, Mé...
TMM
2010
151views Management» more  TMM 2010»
14 years 4 months ago
SPANC: Optimizing Scheduling Delay for Peer-to-Peer Live Streaming
Abstract--In peer-to-peer (P2P) live streaming using unstructured mesh, packet scheduling is an important factor in overall playback delay. In this paper, we propose a scheduling a...
Tammy Kam-Hung Chan, Shueng-Han Gary Chan, Ali C. ...
« Prev « First page 1427 / 1434 Last » Next »