Sciweavers

13841 search results - page 2564 / 2769
» Algorithms and Constraint Programming
Sort
View
131
Voted
CDC
2008
IEEE
15 years 10 months ago
Shannon meets Bellman: Feature based Markovian models for detection and optimization
— The goal of this paper is to develop modeling techniques for complex systems for the purposes of control, estimation, and inference: (i) A new class of Hidden Markov Models is ...
Sean P. Meyn, George Mathew
123
Voted
GLOBECOM
2008
IEEE
15 years 10 months ago
One- and Two-Way Decode-and-Forward Relaying for Wireless Multiuser MIMO Networks
— In this paper, we propose multiuser multiple-input multiple-ouput (MIMO) one- and two-way relaying protocols. Several wireless MIMO node pairs are establishing either unidirect...
Celal Esli, Armin Wittneben
136
Voted
GLOBECOM
2008
IEEE
15 years 10 months ago
Collusion-Resistant Multi-Winner Spectrum Auction for Cognitive Radio Networks
—In order to fully utilize spectrum, auction-based dynamic spectrum allocation has become a promising approach which allows unlicensed wireless users to lease unused bands from s...
Yongle Wu, Beibei Wang, K. J. Ray Liu, T. Charles ...
ICASSP
2008
IEEE
15 years 10 months ago
Address assignment sensitive variable partitioning and scheduling for DSPS with multiple memory banks
Multiple memory banks design is employed in many high performance DSP processors. This architectural feature supports higher memory bandwidth by allowing multiple data memory acce...
Chun Jason Xue, Tiantian Liu, Zili Shao, Jingtong ...
159
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Type and Effect Annotations for Safe Memory Access in C
In this paper, we present a novel type and effect analysis for detecting memory errors in C source code. We extend the standard C type system with effect, region, and host annotat...
Syrine Tlili, Mourad Debbabi
« Prev « First page 2564 / 2769 Last » Next »