Sciweavers

4674 search results - page 926 / 935
» cases 2008
Sort
View
CORR
2008
Springer
141views Education» more  CORR 2008»
14 years 9 months ago
Model checking memoryful linear-time logics over one-counter automata
We study complexity of the model-checking problems for LTL with registers (also known as freeze LTL and written LTL ) and for first-order logic with data equality tests (written F...
Stéphane Demri, Ranko Lazic, Arnaud Sangnie...
CORR
2008
Springer
116views Education» more  CORR 2008»
14 years 9 months ago
Learning to rank with combinatorial Hodge theory
Abstract. We propose a number of techniques for learning a global ranking from data that may be incomplete and imbalanced -- characteristics that are almost universal to modern dat...
Xiaoye Jiang, Lek-Heng Lim, Yuan Yao, Yinyu Ye
CORR
2008
Springer
73views Education» more  CORR 2008»
14 years 9 months ago
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and multiple receivers in a broadcast channel in the presence of an eavesdropper. Characterizing the secrecy ca...
Ersen Ekrem, Sennur Ulukus
CORR
2008
Springer
120views Education» more  CORR 2008»
14 years 9 months ago
Network Protection Codes: Providing Self-healing in Autonomic Networks Using Network Coding
Agile recovery from link failures in autonomic communication networks is essential to increase robustness, accessibility, and reliability of data transmission. However, this must b...
Salah A. Aly, Ahmed E. Kamal
CORR
2008
Springer
109views Education» more  CORR 2008»
14 years 9 months ago
Dependence Balance Based Outer Bounds for Gaussian Networks with Cooperation and Feedback
We obtain new outer bounds on the capacity regions of the two-user multiple access channel with generalized feedback (MAC-GF) and the two-user interference channel with generalize...
Ravi Tandon, Sennur Ulukus