Sciweavers

2143 search results - page 314 / 429
» corr 2010
Sort
View
122
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 26 days ago
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices a...
Ashish Khisti, Gregory W. Wornell
98
Voted
CORR
2010
Springer
75views Education» more  CORR 2010»
15 years 26 days ago
Linear Algebra in the vector space of intervals
In a previous paper, we have given an algebraic model to the set of intervals. Here, we apply this model in a linear frame. For example, we define a notion of diagonalization of s...
Nicolas Goze
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 26 days ago
Redundancies in Dependently Typed Lambda Calculi and Their Relevance to Proof Search
Dependently typed -calculi such as the Logical Framework (LF) are capable of representing relationships between terms through types. By exploiting the "formulas-as-types"...
Zachary Snow, David Baelde, Gopalan Nadathur
77
Voted
CORR
2010
Springer
168views Education» more  CORR 2010»
15 years 26 days ago
Competition of Wireless Providers for Atomic Users
We study a problem where wireless service providers compete for heterogenous and atomic (non-infinitesimal) wireless users. The users differ in their utility functions as well as ...
Vojislav Gajic, Jianwei Huang, Bixio Rimoldi
102
Voted
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 26 days ago
Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying...
Ming-Shing Hsieh