Sciweavers

4335 search results - page 355 / 867
» Privatizing Constraint Optimization
Sort
View
DCC
2006
IEEE
16 years 4 months ago
A Practical Approach to Joint Network-Source Coding
We are interested in how to best communicate a real valued source to a number of destinations (sinks) over a network with capacity constraints in a collective fidelity metric over...
Nima Sarshar, Xiaolin Wu
ICCD
2008
IEEE
133views Hardware» more  ICCD 2008»
16 years 1 months ago
Reliability-aware Dynamic Voltage Scaling for energy-constrained real-time embedded systems
— The Dynamic Voltage Scaling (DVS) technique is the basis of numerous state-of-the-art energy management schemes proposed for real-time embedded systems. However, recent researc...
Baoxian Zhao, Hakan Aydin, Dakai Zhu
HYBRID
2009
Springer
15 years 11 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 11 months ago
Maximizing Throughput in Layered Peer-to-Peer Streaming
—Layered streaming is an effective solution to address the receiver heterogeneity in peer-to-peer (P2P) multimedia distribution. This paper targets a fundamental challenge in thi...
Liang Dai, Yi Cui, Yuan Xue
CP
2005
Springer
15 years 10 months ago
Sub-optimality Approximations
Abstract. The sub-optimality approximation problem considers an optimization problem O, its optimal solution σ∗ , and a variable x with domain {d1, . . . , dm} and returns appro...
Russell Bent, Irit Katriel, Pascal Van Hentenryck