Sciweavers

949 search results - page 97 / 190
» Theory of Constraints
Sort
View
113
Voted
CIMAGING
2009
192views Hardware» more  CIMAGING 2009»
15 years 1 months ago
Compressive coded aperture imaging
Nonlinear image reconstruction based upon sparse representations of images has recently received widespread attention with the emerging framework of compressed sensing (CS). This ...
Roummel F. Marcia, Zachary T. Harmany, Rebecca Wil...
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 24 days ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
110
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
QoS-Driven Power Allocation Over Parallel Fading Channels With Imperfect Channel Estimations in Wireless Networks
— We propose the quality-of-service (QoS) driven power allocation schemes for parallel fading channels when considering imperfect channel estimations. In particular, the parallel...
Jia Tang, Xi Zhang
118
Voted
ATAL
2003
Springer
15 years 6 months ago
Distributing the control of a temporal network among multiple agents
Agents collaborating on a set of tasks subject to temporal constraints must coordinate their activities to ensure that all of the temporal constraints are ultimately satisfied. S...
Luke Hunsberger
107
Voted
COMCOM
1998
102views more  COMCOM 1998»
15 years 11 days ago
Preferred link based delay-constrained least-cost routing in wide area networks
Multimedia applications involving digital audio and/or digital video transmissions require strict QoS constraints (end-to-end delay bound, bandwidth availability, packet loss rate...
R. Sriram, Govindarasu Manimaran, C. Siva Ram Murt...