Sciweavers

26 search results - page 4 / 6
» Studying Maximum Information Leakage Using Karush-Kuhn-Tucke...
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
IJON
2007
73views more  IJON 2007»
14 years 9 months ago
Improvement of spike coincidence detection with facilitating synapses
A realistic model of activity dependent dynamical synapses is used to study the conditions in which a postsynaptic neuron detects temporal coincidences of spikes arriving from N d...
Jorge F. Mejías, Joaquín J. Torres
JSAC
2010
120views more  JSAC 2010»
14 years 4 months ago
Simple movement control algorithm for bi-connectivity in robotic sensor networks
Robotic sensor networks are more powerful than sensor networks because the sensors can be moved by the robots to adjust their sensing coverage. In robotic sensor networks, an impor...
Hai Liu, Xiaowen Chu, Yiu-Wing Leung, Rui Du
BMCBI
2006
119views more  BMCBI 2006»
14 years 9 months ago
LS-NMF: A modified non-negative matrix factorization algorithm utilizing uncertainty estimates
Background: Non-negative matrix factorisation (NMF), a machine learning algorithm, has been applied to the analysis of microarray data. A key feature of NMF is the ability to iden...
Guoli Wang, Andrew V. Kossenkov, Michael F. Ochs
CORR
2007
Springer
158views Education» more  CORR 2007»
14 years 9 months ago
Multi-group ML Decodable Collocated and Distributed Space Time Block Codes
Abstract— In this paper, collocated and distributed spacetime block codes (DSTBCs) which admit multi-group maximum likelihood (ML) decoding are studied. First the collocated case...
G. Susinder Rajan, B. Sundar Rajan