Sciweavers

3483 search results - page 130 / 697
» Forward
Sort
View
CORR
2008
Springer
103views Education» more  CORR 2008»
15 years 3 months ago
Secret Communication with Feedback
Secure communication with feedback is studied. An achievability scheme in which the backward channel is used to generate a shared secret key is proposed. The scenario of binary sy...
Deniz Gündüz, D. Richard Brown III, H. V...
NA
2008
203views more  NA 2008»
15 years 3 months ago
Block Krylov-Schur method for large symmetric eigenvalue problems
Stewart's Krylov-Schur algorithm offers two advantages over Sorensen's implicitly restarted Arnoldi (IRA) algorithm. The first is ease of deflation of converged Ritz vect...
Yunkai Zhou, Yousef Saad
SIGMOBILE
2008
86views more  SIGMOBILE 2008»
15 years 3 months ago
Profile-cast: behavior-aware mobile networking
In this paper we advocate a service paradigm, profile-cast, within the communication framework of delay tolerant networks (DTN)[2]. This novel approach leverages the behavioral pat...
Wei-jen Hsu, Debojyoti Dutta, Ahmed Helmy
137
Voted
TCOM
2008
108views more  TCOM 2008»
15 years 3 months ago
Two-relay distributed switch and stay combining
We study a distributed version of switch-and-stay combining (DSSC) for systems that utilize two relays. In particular, four different scenarios are considered, depending on a) whet...
Diomidis S. Michalopoulos, George K. Karagiannidis
AUTOMATICA
1999
37views more  AUTOMATICA 1999»
15 years 3 months ago
Uniqueness of solutions of linear relay systems
In this paper we study the well-posedness (existence and uniqueness of solutions) of linear relay systems with respect to two di erent solution concepts, Filippov solutions and fo...
Y. J. Lootsma, A. J. van der Schaft, M. K. Ç...