Sciweavers

31 search results - page 5 / 7
» Constrained LCS: Hardness and Approximation
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
Robust secondary multicast transmit beamforming for cognitive radio networks under imperfect channel state information
Consider a robust downlink beamforming optimization problem for secondary multicast transmission in a multiple-input multiple-output (MIMO) spectrum sharing cognitive radio (CR) n...
Yongwei Huang, Qiang Li, Wing-Kin Ma, Shuzhong Zha...
CDC
2009
IEEE
141views Control Systems» more  CDC 2009»
15 years 2 months ago
Periodic power management schemes for real-time event streams
Abstract— Power dissipation has constrained the performance boosting of modern computer systems in the past decade. Dynamic power management (DPM) has been implemented in many sy...
Kai Huang, Luca Santinelli, Jian-Jia Chen, Lothar ...
ICASSP
2011
IEEE
14 years 1 months ago
Acoustic model training for non-audible murmur recognition using transformed normal speech data
In this paper we present a novel approach to acoustic model training for non-audible murmur (NAM) recognition using normal speech data transformed into NAM data. NAM is extremely ...
Denis Babani, Tomoki Toda, Hiroshi Saruwatari, Kiy...
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 3 months ago
Subjective-Cost Policy Routing
We study a model of path-vector routing in which nodes’ routing policies are based on subjective cost assessments of alternative routes. The routes are constrained by the requir...
Joan Feigenbaum, David R. Karger, Vahab S. Mirrokn...
WWW
2009
ACM
15 years 10 months ago
Bid optimization for broad match ad auctions
Ad auctions in sponsored search support"broad match"that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving mo...
Eyal Even-Dar, Vahab S. Mirrokni, S. Muthukrishnan...