Sciweavers

16128 search results - page 2909 / 3226
» Distributed network scheduling
Sort
View
ECEASST
2010
15 years 1 months ago
Open Source Verification under a Cloud
Abstract: An experiment in providing volunteer cloud computing support for automated audits of open source code is described here, along with the supporting theory. Certification a...
Peter T. Breuer, Simon Pickin
CORR
2010
Springer
140views Education» more  CORR 2010»
15 years 13 days ago
Construction of New Delay-Tolerant Space-Time Codes
Perfect Space-Time Codes are optimal codes in their original construction for Multiple Input Multiple Output (MIMO) systems. Based on cyclic division algebras, they are full-rate,...
Mireille Sarkiss, Ghaya Rekaya-Ben Othman, Mohamed...
CDC
2010
IEEE
182views Control Systems» more  CDC 2010»
14 years 10 months ago
An approximate dual subgradient algorithm for multi-agent non-convex optimization
We consider a multi-agent optimization problem where agents aim to cooperatively minimize a sum of local objective functions subject to a global inequality constraint and a global ...
Minghui Zhu, Sonia Martínez
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 10 months ago
A Secure Communication Game with a Relay Helping the Eavesdropper
—In this work a four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is studied. The jammer relay does not hear the source trans...
Melda Yuksel, Xi Liu, Elza Erkip
JIPS
2010
110views more  JIPS 2010»
14 years 10 months ago
A License Audit Model for Secure DRM Systems in IP-based Environments
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by c...
Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin
« Prev « First page 2909 / 3226 Last » Next »