Sciweavers

314 search results - page 41 / 63
» A Comparison of Known Codes, Random Codes, and the Best Code...
Sort
View
WCNC
2010
IEEE
13 years 11 months ago
Distortion Exponents for Multi-Relay Cooperative Networks with Limited Feedback
— In this paper, we consider the transmission of a Gaussian source in a multi-relay cooperative network, where limited channel state feedback is combined with separate source and...
Jing Wang, Jie Liang, Sami Muhaidat
SODA
1997
ACM
199views Algorithms» more  SODA 1997»
13 years 8 months ago
Fast Algorithms for Sorting and Searching Strings
We present theoretical algorithms for sorting and searching multikey data, and derive from them practical C implementations for applications in which keys are character strings. T...
Jon Louis Bentley, Robert Sedgewick
DCC
2011
IEEE
13 years 2 months ago
Tree Structure Compression with RePair
Larsson and Moffat’s RePair algorithm is generalized from strings to trees. The new algorithm (TreeRePair) produces straight-line linear context-free tree (SLT) grammars which a...
Markus Lohrey, Sebastian Maneth, Roy Mennicke
IJSN
2007
73views more  IJSN 2007»
13 years 7 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
WWW
2007
ACM
14 years 8 months ago
GigaHash: scalable minimal perfect hashing for billions of urls
A minimal perfect function maps a static set of keys on to the range of integers {0,1,2, ... , - 1}. We present a scalable high performance algorithm based on random graphs for ...
Kumar Chellapilla, Anton Mityagin, Denis Xavier Ch...