Sciweavers

3614 search results - page 582 / 723
» Numerical Computing with MATLAB
Sort
View
JSAC
2008
110views more  JSAC 2008»
15 years 1 months ago
Low complexity resource allocation with opportunistic feedback over downlink OFDMA networks
Abstract--Optimal tone allocation in downlink OFDMA networks is a non-convex NP-hard problem that requires extensive feedback for channel information. In this paper, two constantco...
Rajiv Agarwal, Vinay R. Majjigi, Zhu Han, Rath Van...
JSCIC
2008
148views more  JSCIC 2008»
15 years 1 months ago
Finite Element-Based Level Set Methods for Higher Order Flows
In this paper we shall discuss the numerical simulation of higher order geometric flows by level set methods. Main examples under considerations are surface diffusion and the Will...
Martin Burger, Christina Stöcker, Axel Voigt
JCO
2006
67views more  JCO 2006»
15 years 1 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
JITE
2006
106views more  JITE 2006»
15 years 1 months ago
The Information Technology Model Curriculum
The last twenty years has seen the development of demand for a new type of computing professional, which has resulted in the emergence of the academic discipline of Information Te...
Joseph J. Ekstrom, Sandra Gorka, Reza Kamali, Eydi...
MANSCI
2008
122views more  MANSCI 2008»
15 years 1 months ago
Incorporating Asymmetric Distributional Information in Robust Value-at-Risk Optimization
Value-at-Risk (VaR) is one of the most widely accepted risk measures in the financial and insurance industries, yet efficient optimization of VaR remains a very difficult problem....
Karthik Natarajan, Dessislava Pachamanova, Melvyn ...