Sciweavers

4415 search results - page 670 / 883
» How to Pair with a Human
Sort
View
TIFS
2010
184views more  TIFS 2010»
13 years 8 months ago
Information-theoretically secret key generation for fading wireless channels
—The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, ...
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra S...
TMC
2010
138views more  TMC 2010»
13 years 8 months ago
Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks
—One important application of cooperative communications is to extend coverage area in wireless networks without increasing infrastructure. However, a crucial challenge in implem...
Ahmed K. Sadek, Zhu Han, K. J. Ray Liu
WABI
2010
Springer
128views Bioinformatics» more  WABI 2010»
13 years 8 months ago
Sparsification of RNA Structure Prediction Including Pseudoknots
Background: Although many RNA molecules contain pseudoknots, computational prediction of pseudoknotted RNA structure is still in its infancy due to high running time and space con...
Mathias Möhl, Raheleh Salari, Sebastian Will,...
ICDM
2010
IEEE
146views Data Mining» more  ICDM 2010»
13 years 8 months ago
One-Class Matrix Completion with Low-Density Factorizations
Consider a typical recommendation problem. A company has historical records of products sold to a large customer base. These records may be compactly represented as a sparse custom...
Vikas Sindhwani, Serhat Selcuk Bucak, Jianying Hu,...
IMC
2010
ACM
13 years 8 months ago
Resolving IP aliases with prespecified timestamps
Operators and researchers want accurate router-level views of the Internet for purposes including troubleshooting and modeling. However, tools such as traceroute return IP address...
Justine Sherry, Ethan Katz-Bassett, Mary Pimenova,...