Sciweavers

575 search results - page 37 / 115
» constraints 2011
Sort
View
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 3 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
ICASSP
2011
IEEE
14 years 3 months ago
Robust SINR-constrained MISO downlink beamforming: When is semidefinite programming relaxation tight?
We consider the robust beamforming problem under imperfect channel state information (CSI) subject to SINR constraints in a downlink multiuser MISO system. One popular approach to...
Enbin Song, Qingjiang Shi, Maziar Sanjabi, Ruoyu S...
ICASSP
2011
IEEE
14 years 3 months ago
Max-min fair rate control based on a saddle-point characterization of some perron roots
We consider a power-controlled wireless network with an established network topology in which the communication links (transmitter-receiver pairs) are subject to general constrain...
Slawomir Stanczak, Michal Kaliszan, Mario Goldenba...
ICASSP
2011
IEEE
14 years 3 months ago
Integrated Sidelobe Level of sets of Rotated Legendre Sequences
We here address the problem of constructing sets of sequences with low integrated aperiodic auto- and crosscorrelations when the constraint of antipodal symbols is enforced. Our m...
Salvador Javier Haboba, Riccardo Rovatti, Gianluca...
ICASSP
2011
IEEE
14 years 3 months ago
On efficient soft-input soft-output encoding of convolutional codes
We study efficient algorithms for soft-input soft-output (SISO) encoding of convolutional codes. While the BCJR algorithm has been suggested for SISO encoding, we show that a for...
Andreas Winkelbauer, Gerald Matz