Sciweavers

2687 search results - page 537 / 538
» On the Conversion between Number Systems
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
SIAMJO
2011
12 years 10 months ago
Rank-Sparsity Incoherence for Matrix Decomposition
Suppose we are given a matrix that is formed by adding an unknown sparse matrix to an unknown low-rank matrix. Our goal is to decompose the given matrix into its sparse and low-ran...
Venkat Chandrasekaran, Sujay Sanghavi, Pablo A. Pa...
WMCSA
2012
IEEE
12 years 3 months ago
Code in the air: simplifying sensing and coordination tasks on smartphones
A growing class of smartphone applications are tasking applications that run continuously, process data from sensors to determine the user’s context (such as location) and activ...
Lenin Ravindranath, Arvind Thiagarajan, Hari Balak...
INFOCOM
2012
IEEE
11 years 10 months ago
FemtoCaching: Wireless video content delivery through distributed caching helpers
Abstract—We suggest a novel approach to handle the ongoing explosive increase in the demand for video content in wireless/mobile devices. We envision femtocell-like base stations...
Negin Golrezaei, Karthikeyan Shanmugam, Alexandros...
SIGIR
2012
ACM
11 years 10 months ago
Optimizing positional index structures for versioned document collections
Versioned document collections are collections that contain multiple versions of each document. Important examples are Web archives, Wikipedia and other wikis, or source code and ...
Jinru He, Torsten Suel