Sciweavers

312 search results - page 53 / 63
» Problem Structure in the Presence of Perturbations
Sort
View
PERCOM
2009
ACM
15 years 10 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi
CORR
2010
Springer
141views Education» more  CORR 2010»
14 years 10 months ago
Full vectoring optimal power allocation in xDSL channels under per-modem power constraints and spectral mask constraints
In xDSL systems, crosstalk can be separated into two categories, namely in-domain crosstalk and out-of-domain crosstalk. Indomain crosstalk is also refered to as self crosstalk. Ou...
Vincent Le Nir, Marc Moonen, Jan Verlinden, Mamoun...
MONET
2011
14 years 23 days ago
Distributed Coalition Formation Games for Secure Wireless Transmission
Cooperation among wireless nodes has been recently proposed for improving the physical layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers. Whil...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...
SDM
2010
SIAM
204views Data Mining» more  SDM 2010»
14 years 11 months ago
Scalable Tensor Factorizations with Missing Data
The problem of missing data is ubiquitous in domains such as biomedical signal processing, network traffic analysis, bibliometrics, social network analysis, chemometrics, computer...
Evrim Acar, Daniel M. Dunlavy, Tamara G. Kolda, Mo...
STOC
2001
ACM
123views Algorithms» more  STOC 2001»
15 years 10 months ago
On optimal slicing of parallel programs
Optimal program slicing determines for a statement S in a program whether or not S affects a specified set of statements, given that all conditionals in are interpreted as non-d...
Markus Müller-Olm, Helmut Seidl