Sciweavers

ACSSC
2015
1views more  ACSSC 2015»
10 years 9 days ago
Strong secrecy for interference channels from channel resolvability
Abstract—The achievable rate region is studied for interference channels with confidential messages under strong secrecy constraints. The problem is investigated based on the fr...
Zhao Wang, Rafael F. Schaefer, Mikael Skoglund, H....
ACSSC
2015
9views more  ACSSC 2015»
10 years 9 days ago
Regularization parameter trimming for iterative image reconstruction
Conventional automatic parameter choosing involves testing many parameter values, increasing computing time for iterative image reconstructions. The proposed approach first measur...
Haoyi Liang, Daniel S. Weller
ACSSC
2015
14views more  ACSSC 2015»
10 years 9 days ago
Power allocation for three-phase two-way relay networks with simultaneous wireless information and power transfer
—This paper considers a three-phase two-way relay system in which two single-antenna transceivers exchange data with the help of a multi-antenna energy harvesting relay. An SNR m...
Shahab Farazi, D. Richard Brown III, Andrew G. Kle...
ACSSC
2015
18views more  ACSSC 2015»
10 years 9 days ago
Sparsity-aware distributed conjugate gradient algorithms for parameter estimation over sensor networks
— This paper proposes distributed adaptive algorithms based on the conjugate gradient (CG) method and the diffusion strategy for parameter estimation over sensor networks. We pre...
Tamara Guerra Miller, Songcen Xu, Rodrigo C. de La...
ACSSC
2015
1views more  ACSSC 2015»
10 years 9 days ago
Quantized message passing for LDPC codes
Abstract—We propose a quantized decoding algorithm for lowdensity parity-check codes where the variable node update rule of the standard min-sum algorithm is replaced with a look...
Michael Meidlinger, Alexios Balatsoukas-Stimming, ...
ACSD
2015
IEEE
16views Hardware» more  ACSD 2015»
10 years 9 days ago
When Do We (Not) Need Complex Assume-Guarantee Rules?
Abstract—Assume-guarantee (AG) reasoning is a compositional verification method where a verification task involving many processes is broken into multiple verification tasks i...
Antti Tapani Siirtola, Stavros Tripakis, Keijo Hel...
ACSD
2015
IEEE
16views Hardware» more  ACSD 2015»
10 years 9 days ago
Multi-valued Abstraction Using Lattice Operations
Stefan Vijzelaar, Wan Fokkink
ACSD
2015
IEEE
34views Hardware» more  ACSD 2015»
10 years 9 days ago
Task-FIFO Co-scheduling of Streaming Applications on MPSoCs with Predictable Memory Hierarchy
Abstract—Multi-processor systems-on-chips are widely adopted in implementing modern streaming applications to satisfy the ever increasing computing requirements. Predictable memo...
Qi Tang, Twan Basten, Marc Geilen, Sander Stuijk, ...
ACSC
2015
IEEE
10 years 9 days ago
Hourglass Systems
In this paper, we first describe a simplified scenario observed in mining operations, where trucks are loaded and emptied at different locations. We will then look at ways that...
Yuki Osada, Mark Reynolds, Tim French
ACSC
2015
IEEE
10 years 9 days ago
An Evaluation of POS Tagging for Tweets Using HMM Modelling
Recently there has been an increased demand for natural language processing tools that work well on unstructured and noisy texts such as texts from Twitter messages. It has been s...
Parma Nand, Rivindu Perera