Abstract—The achievable rate region is studied for interference channels with confidential messages under strong secrecy constraints. The problem is investigated based on the fr...
Zhao Wang, Rafael F. Schaefer, Mikael Skoglund, H....
Conventional automatic parameter choosing involves testing many parameter values, increasing computing time for iterative image reconstructions. The proposed approach first measur...
—This paper considers a three-phase two-way relay system in which two single-antenna transceivers exchange data with the help of a multi-antenna energy harvesting relay. An SNR m...
Shahab Farazi, D. Richard Brown III, Andrew G. Kle...
— This paper proposes distributed adaptive algorithms based on the conjugate gradient (CG) method and the diffusion strategy for parameter estimation over sensor networks. We pre...
Tamara Guerra Miller, Songcen Xu, Rodrigo C. de La...
Abstract—We propose a quantized decoding algorithm for lowdensity parity-check codes where the variable node update rule of the standard min-sum algorithm is replaced with a look...
Michael Meidlinger, Alexios Balatsoukas-Stimming, ...
Abstract—Assume-guarantee (AG) reasoning is a compositional verification method where a verification task involving many processes is broken into multiple verification tasks i...
Antti Tapani Siirtola, Stavros Tripakis, Keijo Hel...
Abstract—Multi-processor systems-on-chips are widely adopted in implementing modern streaming applications to satisfy the ever increasing computing requirements. Predictable memo...
Qi Tang, Twan Basten, Marc Geilen, Sander Stuijk, ...
In this paper, we first describe a simplified scenario observed in mining operations, where trucks are loaded and emptied at different locations. We will then look at ways that...
Recently there has been an increased demand for natural language processing tools that work well on unstructured and noisy texts such as texts from Twitter messages. It has been s...