Sciweavers

1516 search results - page 75 / 304
» The Increasing Nvalue Constraint
Sort
View
TDP
2010
189views more  TDP 2010»
14 years 4 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
TIT
2010
101views Education» more  TIT 2010»
14 years 4 months ago
Wideband fading channel capacity with training and partial feedback
We consider the capacity of a wideband fading channel with partial feedback, subject to an average power constraint. A doubly block Rayleigh fading model is assumed with finite co...
Manish Agarwal, Michael L. Honig
TIT
2010
148views Education» more  TIT 2010»
14 years 4 months ago
Compressed genotyping
Abstract--Over the past three decades we have steadily increased our knowledge on the genetic basis of many severe disorders. Nevertheless, there are still great challenges in appl...
Yaniv Erlich, Assaf Gordon, Michael Brand, Gregory...
TON
2010
93views more  TON 2010»
14 years 4 months ago
Design and field experimentation of an energy-efficient architecture for DTN throwboxes
Disruption tolerant networks rely on intermittent contacts between mobile nodes to deliver packets using a storecarry-and-forward paradigm. We earlier proposed the use of throwbox ...
Nilanjan Banerjee, Mark D. Corner, Brian Neil Levi...
TVLSI
2010
14 years 4 months ago
Discrete Buffer and Wire Sizing for Link-Based Non-Tree Clock Networks
Clock network is a vulnerable victim of variations as well as a main power consumer in many integrated circuits. Recently, link-based non-tree clock network attracts people's...
Rupak Samanta, Jiang Hu, Peng Li