Sciweavers

777 search results - page 96 / 156
» presence 2010
Sort
View
103
Voted
CORR
2010
Springer
133views Education» more  CORR 2010»
14 years 11 months ago
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
—In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper. In part...
Amitav Mukherjee, A. Lee Swindlehurst
105
Voted
CORR
2010
Springer
205views Education» more  CORR 2010»
14 years 11 months ago
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
—Wireless mesh networks (WMNs) are evolving as a key technology for next-generation wireless networks showing raid progress and numerous applications. These networks have the pot...
Jaydip Sen, Kaustav Goswami
114
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 11 months ago
Progressive Decoding for Data Availability and Reliability in Distributed Networked Storage
—To harness the ever growing capacity and decreasing cost of storage, providing an abstraction of dependable storage in the presence of crash-stop and Byzantine failures is compu...
Yunghsiang Han, Soji Omiwade, Rong Zheng
DAC
2010
ACM
14 years 11 months ago
An error tolerance scheme for 3D CMOS imagers
A three-dimensional (3D) CMOS imager constructed by stacking a pixel array of backside illuminated sensors, an analog-to-digital converter (ADC) array, and an image signal process...
Hsiu-Ming Chang, Jiun-Lang Huang, Ding-Ming Kwai, ...
96
Voted
FS
2010
148views more  FS 2010»
14 years 11 months ago
Option hedging for small investors under liquidity costs
Following the framework of C¸etin, Jarrow and Protter [4] we study the problem of super-replication in presence of liquidity costs under additional restrictions on the gamma of th...
Umut Çetin, H. Mete Soner, Nizar Touzi