Sciweavers

901 search results - page 37 / 181
» Analyzing linear mergers
Sort
View
CISS
2008
IEEE
15 years 5 months ago
Improved sum-rate optimization in the multiuser MIMO downlink
—We consider linear precoding and decoding in the downlink of a multiuser multiple-input, multiple-output (MIMO) system. In this scenario, the transmitter and the receivers may e...
Adam J. Tenenbaum, Raviraj S. Adve
ISCAS
2003
IEEE
132views Hardware» more  ISCAS 2003»
15 years 4 months ago
Characterization of a simple communication network using Legendre transform
We describe an application of the Legendre transform to communication networks. The Legendre transform applied to max-plus algebra linear systems corresponds to the Fourier transf...
Takashi Hisakado, Kohshi Okumura, Vladimir Vukadin...
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
15 years 6 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
COLT
2007
Springer
15 years 5 months ago
Margin Based Active Learning
We present a framework for margin based active learning of linear separators. We instantiate it for a few important cases, some of which have been previously considered in the lite...
Maria-Florina Balcan, Andrei Z. Broder, Tong Zhang
MOC
1998
94views more  MOC 1998»
14 years 11 months ago
Analysis of third-order methods for secular equations
Third-order numerical methods are analyzed for secular equations. These equations arise in several matrix problems and numerical linear algebra applications. A closer look at an ex...
A. Melman