Sciweavers

760 search results - page 146 / 152
» Efficient Communication Using Partial Information
Sort
View
CCS
2006
ACM
14 years 9 days ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
GEOINFORMATICA
2007
148views more  GEOINFORMATICA 2007»
13 years 8 months ago
Assessing the Certainty of Locations Produced by an Address Geocoding System
Addresses are the most common georeferencing resource people use to communicate to others a location within a city. Urban GIS applications that receive data directly fromcitizens,...
Clodoveu A. Davis, Frederico T. Fonseca
TIT
2002
72views more  TIT 2002»
13 years 8 months ago
Entanglement-assisted capacity of a quantum channel and the reverse Shannon theorem
The entanglement-assisted classical capacity of a noisy quantum channel ( ) is the amount of information per channel use that can be sent over the channel in the limit of many uses...
Charles H. Bennett, Peter W. Shor, John A. Smolin,...
CORR
2010
Springer
258views Education» more  CORR 2010»
13 years 5 months ago
A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network
Power management is one of the vital issue in wireless sensor networks, where the lifetime of the network relies on battery powered nodes. Transmitting at high power reduces the l...
R. Valli, P. Dananjayan
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 8 months ago
Broadcast Cooperation Strategies for Two Colocated Users
This work considers the problem of communication from a single transmitter, over a network with colocated users, through an independent block Rayleigh fading channel. The colocati...
Avi Steiner, Amichai Sanderovich, Shlomo Shamai