Sciweavers

370 search results - page 65 / 74
» Independent Sets with Domination Constraints
Sort
View
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 9 months ago
Broadcast Cooperation Strategies for Two Colocated Users
This work considers the problem of communication from a single transmitter, over a network with colocated users, through an independent block Rayleigh fading channel. The colocati...
Avi Steiner, Amichai Sanderovich, Shlomo Shamai
TWC
2010
13 years 4 months ago
Efficient Spectrum Leasing via Randomized Silencing of Secondary Users
In this paper, a primary (licensed) user leases part of its resources to independent secondary (unlicensed) terminals in exchange for a tariff in dollars per bit, under the constra...
Rocco Di Taranto, Petar Popovski, Osvaldo Simeone,...

Publication
151views
12 years 8 months ago
Embedding Overlap Priors in Variational Left Ventricle Tracking
Tracking heart motion plays an essential role in the diagnosis of cardiovascular diseases. This study investigates overlap priors for variational tracking of the Left Ventricle (LV...
Ismail Ben Ayed, Shuo Li and Ian Ross
IWQOS
2004
Springer
14 years 3 months ago
Robust communications for sensor networks in hostile environments
— Clustering sensor nodes increases the scalability and energy efficiency of communications among them. In hostile environments, unexpected failures or attacks on cluster heads ...
Ossama Younis, Sonia Fahmy, Paolo Santi
EUROCRYPT
2010
Springer
14 years 2 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...