Sciweavers

2652 search results - page 445 / 531
» Privacy-preserving linear programming
Sort
View
IJCSA
2006
95views more  IJCSA 2006»
14 years 10 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
CORR
2007
Springer
104views Education» more  CORR 2007»
14 years 10 months ago
Searching for low weight pseudo-codewords
— Belief Propagation (BP) and Linear Programming (LP) decodings of Low Density Parity Check (LDPC) codes are discussed. We summarize results of instanton/pseudo-codeword approach...
Michael Chertkov, Mikhail G. Stepanov
CORR
2007
Springer
110views Education» more  CORR 2007»
14 years 10 months ago
Information-theoretic limits on sparsity recovery in the high-dimensional and noisy setting
The problem of recovering the sparsity pattern of a fixed but unknown vector β∗ ∈ Rp based on a set of n noisy observations arises in a variety of settings, including subset...
Martin J. Wainwright
JMM2
2008
228views more  JMM2 2008»
14 years 10 months ago
Adaptive AC-Coefficient Prediction for Image Compression and Blind Watermarking
In this work, an adaptive image compression algorithm is proposed based on the prediction of AC coefficients in Discrete Cosine Transform (DCT) block during reconstruction of image...
Kilari Veera Swamy, S. Srinivas Kumar
JPDC
2008
122views more  JPDC 2008»
14 years 10 months ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...