Sciweavers

451 search results - page 45 / 91
» Constrained Sums of Information Systems
Sort
View
CORR
2008
Springer
87views Education» more  CORR 2008»
13 years 10 months ago
The Rate Loss of Single-Letter Characterization: The "Dirty" Multiple Access Channel
For general memoryless systems, the typical information theoretic solution - when exists - has a "single-letter" form. This reflects the fact that optimum performance ca...
Tal Philosof, Ram Zamir
INFOCOM
2010
IEEE
13 years 8 months ago
Opportunistic Spectrum Access with Multiple Users: Learning under Competition
Abstract—The problem of cooperative allocation among multiple secondary users to maximize cognitive system throughput is considered. The channel availability statistics are initi...
Animashree Anandkumar, Nithin Michael, Ao Tang
JSAC
2007
79views more  JSAC 2007»
13 years 9 months ago
Collaborative decoding in bandwidth-constrained environments
We present a cooperative communication scheme in which a group of receivers can collaborate to decode a message that none of the receivers can individually decode. The receivers a...
Arun Nayagam, John M. Shea, Tan F. Wong
EDBT
2004
ACM
172views Database» more  EDBT 2004»
14 years 10 months ago
Efficient Similarity Search for Hierarchical Data in Large Databases
Structured and semi-structured object representations are getting more and more important for modern database applications. Examples for such data are hierarchical structures inclu...
Karin Kailing, Hans-Peter Kriegel, Stefan Schö...
TIT
1998
72views more  TIT 1998»
13 years 9 months ago
Runlength Limited Codes for Single Error-Detection and Single Error-Correction with Mixed Type Errors
Abstract—Runlength-limited (RLL) codes are used in magnetic recording. The error patterns that occur with peak detection magnetic recording systems when using a runlength-limited...
Patrick Perry, Mingche Li, Mao Chao Lin, Zhen Zhan...