Sciweavers

34170 search results - page 6782 / 6834
» Optimization
Sort
View
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
14 years 4 months ago
On subspace identification of cascade structured systems
Subspace identification has proven useful when identifying identifying multi-input multi-output systems. It is, however, important in many applications to take a priori structural ...
Per Hagg, Bo Wahlberg, Henrik Sandberg
CORR
2010
Springer
171views Education» more  CORR 2010»
14 years 4 months ago
Online Learning in Opportunistic Spectrum Access: A Restless Bandit Approach
We consider an opportunistic spectrum access (OSA) problem where the time-varying condition of each channel (e.g., as a result of random fading or certain primary users' activ...
Cem Tekin, Mingyan Liu
JSAC
2011
219views more  JSAC 2011»
14 years 4 months ago
Detection of Small-Scale Primary Users in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices, such as wireless microphones, is a challenging, but very important, problem that has not yet be...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
TIT
2011
157views more  TIT 2011»
14 years 4 months ago
Universal and Composite Hypothesis Testing via Mismatched Divergence
—For the universal hypothesis testing problem, where the goal is to decide between the known null hypothesis distribution and some other unknown distribution, Hoeffding proposed ...
Jayakrishnan Unnikrishnan, Dayu Huang, Sean P. Mey...
ITIIS
2010
129views more  ITIIS 2010»
14 years 4 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
« Prev « First page 6782 / 6834 Last » Next »