Sciweavers

43264 search results - page 8281 / 8653
» Comparing models of computation
Sort
View
144
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 3 months ago
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices a...
Ashish Khisti, Gregory W. Wornell
104
Voted
CORR
2010
Springer
168views Education» more  CORR 2010»
15 years 3 months ago
A Bayesian Review of the Poisson-Dirichlet Process
The two parameter Poisson-Dirichlet process is also known as the PitmanYor Process and related to the Chinese Restaurant Process, is a generalisation of the Dirichlet Process, and...
Wray L. Buntine, Marcus Hutter
CORR
2010
Springer
167views Education» more  CORR 2010»
15 years 3 months ago
Network Flow Algorithms for Structured Sparsity
We consider a class of learning problems that involve a structured sparsityinducing norm defined as the sum of -norms over groups of variables. Whereas a lot of effort has been pu...
Julien Mairal, Rodolphe Jenatton, Guillaume Obozin...
160
Voted
CORR
2008
Springer
123views Education» more  CORR 2008»
15 years 3 months ago
Networks become navigable as nodes move and forget
Abstract. We propose a dynamic process for network evolution, aiming at explaining the emergence of the small world phenomenon, i.e., the statistical observation that any pair of i...
Augustin Chaintreau, Pierre Fraigniaud, Emmanuelle...
97
Voted
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 3 months ago
Deriving Specifications of Dependable Systems: toward a Method
Abstract--This paper proposes a method for deriving formal specifications of systems. To accomplish this task we pass through a non trivial number of steps, concepts and tools wher...
Manuel Mazzara
« Prev « First page 8281 / 8653 Last » Next »