Sciweavers

2286 search results - page 127 / 458
» Algorithms for Categorical Equivalence
Sort
View
KDD
2010
ACM
242views Data Mining» more  KDD 2010»
15 years 6 hour ago
A scalable two-stage approach for a class of dimensionality reduction techniques
Dimensionality reduction plays an important role in many data mining applications involving high-dimensional data. Many existing dimensionality reduction techniques can be formula...
Liang Sun, Betul Ceran, Jieping Ye
ASIACRYPT
2009
Springer
15 years 4 months ago
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
At Eurocrypt 2009 Aggarwal and Maurer proved that breaking RSA is equivalent to factoring in the generic ring model. This model captures algorithms that may exploit the full algeb...
Tibor Jager, Jörg Schwenk
CORR
2008
Springer
155views Education» more  CORR 2008»
14 years 10 months ago
Weighted Sum Rate Optimization for Cognitive Radio MIMO Broadcast Channels
In this paper, we consider a cognitive radio (CR) network in which the unlicensed (secondary) users are allowed to concurrently access the spectrum allocated to the licensed (prim...
Lan Zhang, Yan Xin, Ying-Chang Liang
ICASSP
2011
IEEE
14 years 1 months ago
Adaptive beam tracking for interference alignment in time-varying MIMO interference channels: Conjugate gradient approach
Based on a linear formulation to interference alignment, an adaptive algorithm for interference-aligning beam tracking in time-varying MIMO interference channels is proposed. It i...
Junse Lee, Heejung Yu, Youngchul Sung, Yong H. Lee
AAECC
2006
Springer
74views Algorithms» more  AAECC 2006»
15 years 4 months ago
Nested Codes for Constrained Memory and for Dirty Paper
Abstract Dirty paper coding are relevant for wireless networks, multiuser channels, and digital watermarking. We show that the problem of dirty paper is essentially equivalent to s...
Hans Georg Schaathun, Gérard D. Cohen