Sciweavers

589 search results - page 26 / 118
» Generalized Dominators and Post-Dominators
Sort
View
119
Voted
ASPDAC
2010
ACM
155views Hardware» more  ASPDAC 2010»
14 years 10 months ago
Efficient model reduction of interconnects via double gramians approximation
The gramian approximation methods have been proposed recently to overcome the high computing costs of classical balanced truncation based reduction methods. But those methods typi...
Boyuan Yan, Sheldon X.-D. Tan, Gengsheng Chen, Yic...
96
Voted
ISBI
2004
IEEE
16 years 1 months ago
A Hierarchical Algorithm for Fast Backprojection in Helical Cone-Beam Tomography
Existing algorithms for exact helical cone beam (HCB) tomographic reconstruction involve a 3-D backprojection step, which dominates the the computational cost of the algorithm. We...
Jeffrey Brokish, Yoram Bresler
91
Voted
ALDT
2009
Springer
153views Algorithms» more  ALDT 2009»
15 years 7 months ago
Game Theory without Decision-Theoretic Paradoxes
Most work in game theory is conducted under the assumption that the players are expected utility maximizers. Expected utility is a very tractable decision model, but is prone to w...
Pierfrancesco La Mura
106
Voted
TIT
2010
114views Education» more  TIT 2010»
14 years 7 months ago
Convergence of min-sum message-passing for convex optimization
Abstract--We establish that the min-sum messagepassing algorithm and its asynchronous variants converge for a large class of unconstrained convex optimization problems, generalizin...
Ciamac Cyrus Moallemi, Benjamin Van Roy
97
Voted
TWC
2008
147views more  TWC 2008»
15 years 17 days ago
On antijamming in general CDMA systems-part I: multiuser capacity analysis
Abstract--The capacity of a general multiuser CDMA jamming channel is analyzed when the receiver has or lacks jammer state information. Analyses are carried out for noncooperative ...
Reza Nikjah, Norman C. Beaulieu