Sciweavers

21984 search results - page 4185 / 4397
» C
Sort
View
CORR
2010
Springer
111views Education» more  CORR 2010»
15 years 5 months ago
Improved complexity bounds for real root isolation using Continued Fractions
We consider the problem of isolating the real roots of a square-free polynomial with integer coefficients using (variants of) the continued fraction algorithm (CF). We introduce a...
Elias P. Tsigaridas
CORR
2010
Springer
164views Education» more  CORR 2010»
15 years 5 months ago
Sub-Nyquist Sampling of Short Pulses: Part I
We develop sub-Nyquist sampling systems for analog signals comprised of several, possibly overlapping, finite duration pulses with unknown shapes and time positions. Efficient sam...
Ewa Matusiak, Yonina C. Eldar
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 5 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
163
Voted
CORR
2010
Springer
210views Education» more  CORR 2010»
15 years 5 months ago
Exploiting Statistical Dependencies in Sparse Representations for Signal Recovery
Signal modeling lies at the core of numerous signal and image processing applications. A recent approach that has drawn considerable attention is sparse representation modeling, in...
Tomer Faktor, Yonina C. Eldar, Michael Elad
138
Voted
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 5 months ago
Maximally Radio-Disjoint Multipath Routing for Wireless Multimedia Sensor Networks
In wireless sensor networks, bandwidth is one of precious resources to multimedia applications. To get more bandwidth, multipath routing is one appropriate solution provided that ...
Moufida Maimour
« Prev « First page 4185 / 4397 Last » Next »