Sciweavers

4870 search results - page 947 / 974
» Construction of Wavelets and Applications
Sort
View
CORR
2010
Springer
182views Education» more  CORR 2010»
13 years 7 months ago
Index coding via linear programming
Abstract Anna Blasiak Robert Kleinberg Eyal Lubetzky Index Coding has received considerable attention recently motivated in part by applications such as fast video-on-demand and e...
Anna Blasiak, Robert D. Kleinberg, Eyal Lubetzky
COMCOM
2008
111views more  COMCOM 2008»
13 years 7 months ago
An admission control algorithm for multi-hop 802.11e-based WLANs
Recently, wireless local area network (WLAN) hotspots have been deployed in many areas (e.g., cafes, airports, university campuses). The new IEEE 802.11e standard further provides...
Yuxia Lin, Vincent W. S. Wong
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 7 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
COMPUTING
2008
174views more  COMPUTING 2008»
13 years 7 months ago
Multilevel algorithms for Rannacher-Turek finite element approximation of 3D elliptic problems
Generalizing the approach of a previous work [15] the authors present multilevel preconditioners for three-dimensional (3D) elliptic problems discretized by a family of Rannacher ...
Ivan Georgiev, Johannes Kraus, Svetozar Margenov
CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 7 months ago
On Unconditionally Secure Computation with Vanishing Communication Cost
We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalize...
Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar