Sciweavers

118 search results - page 20 / 24
» Bounds on mutual information for simple codes using informat...
Sort
View
USS
2004
13 years 8 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
ESA
2009
Springer
90views Algorithms» more  ESA 2009»
14 years 2 months ago
Storing a Compressed Function with Constant Time Access
We consider the problem of representing, in a space-efficient way, a function f : S → Σ such that any function value can be computed in constant time on a RAM. Specifically, ou...
Jóhannes B. Hreinsson, Morten Krøyer...
ICC
2008
IEEE
121views Communications» more  ICC 2008»
14 years 1 months ago
Analysis of a General Mixed Strategy for Gaussian Multiple Relay Channels
— In their landmark paper Cover and El Gamal proposed different coding strategies for the relay channel with a single relay supporting a communication pair. These strategies are ...
Peter Rost, Gerhard Fettweis
TCOM
2008
115views more  TCOM 2008»
13 years 7 months ago
Differentiated rate scheduling for the down-link of cellular systems
We consider the problem of differentiated rate scheduling for the downlink (i.e., multi-antenna broadcast channel), in the sense that the rates required by different users must sat...
Amir F. Dana, Masoud Sharif, Ali Vakili, Babak Has...
IROS
2009
IEEE
132views Robotics» more  IROS 2009»
14 years 2 months ago
Segregation in swarms of mobile robots based on the Brazil nut effect
— We study a simple algorithm inspired by the Brazil nut effect for achieving segregation in a swarm of mobile robots. The algorithm lets each robot mimic a particle of a certain...
Roderich Groß, Stéphane Magnenat, Fra...