Sciweavers

798 search results - page 128 / 160
» presence 2006
Sort
View
CORR
2006
Springer
151views Education» more  CORR 2006»
14 years 9 months ago
On the Secrecy Capacity of Fading Channels
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of...
Praveen Kumar Gopala, Lifeng Lai, Hesham El Gamal
CORR
2006
Springer
116views Education» more  CORR 2006»
14 years 9 months ago
Energy Efficiency and Delay Quality-of-Service in Wireless Networks
The energy-delay tradeoffs in wireless networks are studied using a game-theoretic framework. A multi-class multipleaccess network is considered in which users choose their transmi...
Farhad Meshkati, H. Vincent Poor, Stuart C. Schwar...
CORR
2006
Springer
126views Education» more  CORR 2006»
14 years 9 months ago
The Gaussian Multiple Access Wire-Tap Channel
We consider the General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intellige...
Ender Tekin, Aylin Yener
CORR
2006
Springer
96views Education» more  CORR 2006»
14 years 9 months ago
How accurate are the time delay estimates in gravitational lensing?
We present a novel approach to estimate the time delay between light curves of multiple images in a gravitationally lensed system, based on Kernel methods in the context of machine...
Juan C. Cuevas-Tello, Peter Tino, Somak Raychaudhu...
CORR
2006
Springer
108views Education» more  CORR 2006»
14 years 9 months ago
Static Analysis using Parameterised Boolean Equation Systems
The well-known problem of state space explosion in model checking is even more critical when applying this technique to programming languages, mainly due to the presence of complex...
María-del-Mar Gallardo, Christophe Joubert,...