Sciweavers

22193 search results - page 4234 / 4439
» Multiple Restricted Multiplication
Sort
View
CORR
2008
Springer
120views Education» more  CORR 2008»
15 years 3 months ago
Network Protection Codes: Providing Self-healing in Autonomic Networks Using Network Coding
Agile recovery from link failures in autonomic communication networks is essential to increase robustness, accessibility, and reliability of data transmission. However, this must b...
Salah A. Aly, Ahmed E. Kamal
CORR
2008
Springer
109views Education» more  CORR 2008»
15 years 3 months ago
Dependence Balance Based Outer Bounds for Gaussian Networks with Cooperation and Feedback
We obtain new outer bounds on the capacity regions of the two-user multiple access channel with generalized feedback (MAC-GF) and the two-user interference channel with generalize...
Ravi Tandon, Sennur Ulukus
DAM
2008
136views more  DAM 2008»
15 years 3 months ago
General theory of information transfer: Updated
We report on ideas, problems and results, which occupied us during the past decade and which seem to extend the frontiers of information theory in several directions. The main con...
Rudolf Ahlswede
DAM
2008
114views more  DAM 2008»
15 years 3 months ago
Efficient solutions to the braid isotopy problem
We describe the most efficient solutions to the word problem of Artin's braid group known so far, i.e., in other words, the most efficient solutions to the braid isotopy probl...
Patrick Dehornoy
DATAMINE
2008
137views more  DATAMINE 2008»
15 years 3 months ago
Two heads better than one: pattern discovery in time-evolving multi-aspect data
Abstract. Data stream values are often associated with multiple aspects. For example, each value observed at a given time-stamp from environmental sensors may have an associated ty...
Jimeng Sun, Charalampos E. Tsourakakis, Evan Hoke,...
« Prev « First page 4234 / 4439 Last » Next »