Sciweavers

93 search results - page 16 / 19
» Lowness properties and approximations of the jump
Sort
View
TGC
2007
Springer
14 years 1 months ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith
GLOBECOM
2007
IEEE
14 years 1 months ago
On Finite-SNR Diversity-Multiplexing Tradeoff
— Diversity–multiplexing tradeoff (DMT) presents a compact framework to compare various MIMO systems and channels in terms of the two main advantages they provide (i.e. high da...
Sergey Loyka, George Levin
WOWMOM
2005
ACM
82views Multimedia» more  WOWMOM 2005»
14 years 28 days ago
Power Control is not Required for Wireless Networks in the Linear Regime
— We consider the design of optimal strategies for joint power adaptation, rate adaptation and scheduling in a multi-hop wireless network. Most existing strategies control either...
Bozidar Radunovic, Jean-Yves Le Boudec
BMCBI
2007
128views more  BMCBI 2007»
13 years 7 months ago
A robust and efficient algorithm for the shape description of protein structures and its application in predicting ligand bindin
Background: An accurate description of protein shape derived from protein structure is necessary to establish an understanding of protein-ligand interactions, which in turn will l...
Lei Xie, Philip E. Bourne
AI
1998
Springer
13 years 7 months ago
Methods for Task Allocation via Agent Coalition Formation
Task execution in multi-agent environments may require cooperation among agents. Given a set of agents and a set of tasks which they have to satisfy, we consider situations where ...
Onn Shehory, Sarit Kraus