Sciweavers

642 search results - page 88 / 129
» corr 2006
Sort
View
128
Voted
CORR
2006
Springer
141views Education» more  CORR 2006»
15 years 19 days ago
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
The asymptotic iterative decoding performances of low-density parity-check (LDPC) codes using min-sum (MS) and sum-product (SP) decoding algorithms on memoryless binary-input outp...
Chun-Hao Hsu, Achilleas Anastasopoulos
CORR
2006
Springer
110views Education» more  CORR 2006»
15 years 19 days ago
Multiple Access Channels with State Information Known at Some Encoders
We consider a multiple access channel (MAC) with channel state information (CSI) non-causally known at some encoders. For simplicity of exposition, we focus on a two-encoder model...
Shivaprasad Kotagiri, J. Nicholas Laneman
116
Voted
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 19 days ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
111
Voted
CORR
2006
Springer
91views Education» more  CORR 2006»
15 years 19 days ago
Quasi-friendly sup-interpretations
In a previous paper [16], the sup-interpretation method was proposed as a new tool to control memory resources of first order functional programs with pattern matching by static an...
Jean-Yves Marion, Romain Péchoux
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 19 days ago
Turning Cluster Management into Data Management: A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt