Sciweavers

198 search results - page 23 / 40
» Tensor Rank: Some Lower and Upper Bounds
Sort
View
RTCSA
2000
IEEE
15 years 2 months ago
Tracking Real-Time Systems Requirements
One of the hard problems in maintaining real-time systems requirements is to keep track of the impact of resource usage on the applications. Often times, it is not sufficient to ...
Aloysius K. Mok
TIT
1998
55views more  TIT 1998»
14 years 9 months ago
On the Trellis Representation of the Delsarte-Goethals Codes
— In this correspondence, the trellis representation of the Kerdock and Delsarte–Goethals codes is addressed. It is shown that the states of a trellis representation of DG(m; ...
Yaron Shany, Ilan Reuven, Yair Be'ery
80
Voted
WDAG
2010
Springer
183views Algorithms» more  WDAG 2010»
14 years 8 months ago
What Is the Use of Collision Detection (in Wireless Networks)?
We show that the asymptotic gain in the time complexity when using collision detection depends heavily on the task by investigating three prominent problems for wireless networks,...
Johannes Schneider, Roger Wattenhofer
TRANSCI
2011
80views more  TRANSCI 2011»
14 years 5 months ago
The Dynamic Uncapacitated Hub Location Problem
This paper presents a dynamic (or multi-period) hub location problem. It proposes a branch-and-bound algorithm that uses a Lagrangean relaxation to obtain lower and upper bounds a...
Ivan Contreras, Jean-François Cordeau, Gilb...
91
Voted
CRYPTO
2012
Springer
268views Cryptology» more  CRYPTO 2012»
13 years 17 days ago
Secret Sharing Schemes for Very Dense Graphs
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct the secret while every independent set in the graph does not get any informatio...
Amos Beimel, Oriol Farràs, Yuval Mintz