Sciweavers

922 search results - page 165 / 185
» A generalization of the Lin-Zhao theorem
Sort
View
CORR
1999
Springer
138views Education» more  CORR 1999»
13 years 7 months ago
A simple proof of the unconditional security of quantum key distribution
Quantum key distribution is the best known application of quantum cryptography. Previously proposed proofs of security of quantum key distribution contain various technical subtle...
Hoi-Kwong Lo
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 7 months ago
Convergent discrete Laplace-Beltrami operators over surfaces
The convergence problem of the Laplace-Beltrami operators plays an essential role in the convergence analysis of the numerical simulations of some important geometric partial diff...
Jyh-Yang Wu, Mei-Hsiu Chi, Sheng-Gwo Chen
INFOCOM
2010
IEEE
13 years 6 months ago
Cross-layer Optimization for Wireless Networks with Deterministic Channel Models
Abstract—Existing work on cross-layer optimization for wireless networks adopts simple physical-layer models, i.e., treating interference as noise. In this paper, we adopt a dete...
Ziyu Shao, Minghua Chen, Salman Avestimehr, Shuo-Y...
JACM
2010
116views more  JACM 2010»
13 years 6 months ago
The complexity of temporal constraint satisfaction problems
A temporal constraint language is a set of relations that has a first-order definition in (Q, <), the dense linear order of the rational numbers. We present a complete comple...
Manuel Bodirsky, Jan Kára
TIT
2008
84views more  TIT 2008»
13 years 6 months ago
A Note on Rate-Distortion Functions for Nonstationary Gaussian Autoregressive Processes
Source coding theorems and Shannon rate-distortion functions were studied for the discrete-time Wiener process by Berger and generalized to nonstationary Gaussian autoregressive p...
Robert M. Gray, Takeshi Hashimoto