Sciweavers

3190 search results - page 42 / 638
» cans 2011
Sort
View
132
Voted
MST
2011
237views Hardware» more  MST 2011»
14 years 7 months ago
On the Complexity of Computing Winning Strategies for Finite Poset Games
This paper is concerned with the complexity of computing winning strategies for poset games. While it is reasonably clear that such strategies can be computed in PSPACE, we give a ...
Michael Soltys, Craig Wilson
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 4 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
ICASSP
2011
IEEE
14 years 4 months ago
A cross-layer optimization for energy-efficient MAC protocol with delay and rate constraints
We propose the energy efficient MAC algorithm in this paper. In the proposed algorithm, each node sets the contention window size with respect to the residual energy, the harvest...
Haksub Kim, Hyungkeuk Lee, Sanghoon Lee
122
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Distributed routing in networks using affinity propagation
This paper applies affinity propagation (AP) to develop distributed solutions for routing over networks. AP is a message passing algorithm for unsupervised learning. This paper d...
Manohar Shamaiah, Sang Hyun Lee, Sriram Vishwanath...
ICASSP
2011
IEEE
14 years 4 months ago
Augmented complex matrix factorisation
A novel framework for the factorisation of complex-valued data is derived using recent developments in complex statistics. Unlike existing factorisation tools the algorithms can c...
David Looney, Danilo P. Mandic