Sciweavers

1209 search results - page 236 / 242
» Approximation by pseudo-linear operators
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Routing and Scheduling for Energy and Delay Minimization in the Powerdown Model
—Energy conservation is drawing increasing attention in data networking. One school of thought believes that a dominant amount of energy saving comes from turning off network ele...
Matthew Andrews, Antonio Fernández, Lisa Zh...
INFOCOM
2010
IEEE
14 years 8 months ago
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks
—In Multi-User MIMO networks, receivers decode multiple concurrent signals using Successive Interference Cancellation (SIC). With SIC a weak target signal can be deciphered in th...
Ece Gelal, Konstantinos Pelechrinis, Tae-Suk Kim, ...
IOR
2010
75views more  IOR 2010»
14 years 8 months ago
Confronting Entrenched Insurgents
During counterinsurgency operations, government forces with superior …repower confront weaker lowsignature insurgents. Under what conditions should government (Blue) forces atta...
Edward H. Kaplan, Moshe Kress, Roberto Szechtman
SIAMSC
2010
141views more  SIAMSC 2010»
14 years 8 months ago
An Iterative Method for Edge-Preserving MAP Estimation When Data-Noise Is Poisson
In numerous applications of image processing, e.g. astronomical and medical imaging, data-noise is well-modeled by a Poisson distribution. This motivates the use of the negative-lo...
Johnathan M. Bardsley, John Goldes
99
Voted
ASIACRYPT
2010
Springer
14 years 8 months ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert