Sciweavers

71 search results - page 7 / 15
» Policy iteration based feedback control
Sort
View
CHI
2011
ACM
12 years 11 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
TIT
2010
115views Education» more  TIT 2010»
13 years 2 months ago
On resource allocation in fading multiple-access channels-an efficient approximate projection approach
We consider the problem of rate and power allocation in a multiple-access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave ut...
Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozd...
JSAC
2007
98views more  JSAC 2007»
13 years 7 months ago
Optimum Power Allocation for Single-User MIMO and Multi-User MIMO-MAC with Partial CSI
Abstract— We consider both the single-user and the multiuser power allocation problems in MIMO systems, where the receiver side has the perfect channel state information (CSI), a...
Alper Soysal, Sennur Ulukus
CISS
2010
IEEE
12 years 11 months ago
The maximum stable broadcast throughput for wireless line networks with network coding and topology control
—We consider broadcasting from a single source to multiple destinations in a linear wireless erasure network with feedback. The problem is to find the maximum stable throughput ...
Ka-Hung Hui, Yalin Evren Sagduyu, Dongning Guo, Ra...
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu