Sciweavers

4908 search results - page 928 / 982
» On the Complexity of Optimal K-Anonymity
Sort
View
CLUSTER
2007
IEEE
15 years 6 months ago
Evaluation of fault-tolerant policies using simulation
— Various mechanisms for fault-tolerance (FT) are used today in order to reduce the impact of failures on application execution. In the case of system failure, standard FT mechan...
Anand Tikotekar, Geoffroy Vallée, Thomas Na...
GLOBECOM
2007
IEEE
15 years 6 months ago
Beamforming with Limited Feedback in Amplify-and-Forward Cooperative Networks
— A relay selection approach has previously been shown to outperform repetition-based scheduling for both amplify-and-forward (AF) and decode-and-forward (DF) cooperative network...
Yi Zhao, Raviraj Adve, Teng Joon Lim
ICC
2007
IEEE
387views Communications» more  ICC 2007»
15 years 6 months ago
LS Channel Estimation for Mobile OFDM Communications on Time-Varying Frequency-Selective Fading Channels
Abstract— A least-squares (LS) channel estimation (CE) technique for mobile OFDM communications over a rapidly timevarying frequency-selective fading channel is investigated in t...
Jia-Chin Lin
ICRA
2007
IEEE
211views Robotics» more  ICRA 2007»
15 years 6 months ago
Control Camera and Light Source Positions using Image Gradient Information
— In this paper, we propose an original approach to control camera position and/or lighting conditions in an environment using image gradient information. Our goal is to ensure a...
Éric Marchand
IPPS
2007
IEEE
15 years 6 months ago
Nonuniformly Communicating Noncontiguous Data: A Case Study with PETSc and MPI
Due to the complexity associated with developing parallel applications, scientists and engineers rely on highlevel software libraries such as PETSc, ScaLAPACK and PESSL to ease th...
Pavan Balaji, Darius Buntinas, Satish Balay, Barry...