Sciweavers

725 search results - page 57 / 145
» Bounding Degrees on RPL
Sort
View
TIT
2002
126views more  TIT 2002»
15 years 10 days ago
Two-dimensional interleaving schemes with repetitions: Constructions and bounds
Abstract--Two-dimensional interleaving schemes with repetitions are considered. These schemes are required for the correction of two-dimensional bursts (or clusters) of errors in a...
Tuvi Etzion, Alexander Vardy
95
Voted
FOCS
2002
IEEE
15 years 5 months ago
Learning a Hidden Matching
We consider the problem of learning a matching (i.e., a graph in which all vertices have degree 0 or 1) in a model where the only allowed operation is to query whether a set of ve...
Noga Alon, Richard Beigel, Simon Kasif, Steven Rud...
116
Voted
CORR
2006
Springer
117views Education» more  CORR 2006»
15 years 22 days ago
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and in...
Ender Tekin, Aylin Yener
101
Voted
CORR
2011
Springer
158views Education» more  CORR 2011»
14 years 7 months ago
SqFreeEVAL: An (almost) optimal real-root isolation algorithm
Let f be a univariate polynomial with real coefficients, f ∈ R[X]. Subdivision algorithms based on algebraic techniques (e.g., Sturm or Descartes methods) are widely used for is...
Michael Burr, Felix Krahmer
MST
2011
184views Hardware» more  MST 2011»
14 years 7 months ago
Stackelberg Strategies and Collusion in Network Games with Splittable Flow
We study the impact of collusion in network games with splittable flow and focus on the well established price of anarchy as a measure of this impact. We first investigate symmet...
Tobias Harks