Sciweavers

1494 search results - page 252 / 299
» Polynomial time algorithms for network information flow
Sort
View
TIT
2010
115views Education» more  TIT 2010»
13 years 3 months ago
On resource allocation in fading multiple-access channels-an efficient approximate projection approach
We consider the problem of rate and power allocation in a multiple-access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave ut...
Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozd...
ICRA
2008
IEEE
176views Robotics» more  ICRA 2008»
14 years 3 months ago
Experimental investigation on underwater acoustic ranging for small robotic fish
— GPS-free localization is essential for navigation and information tagging in small robotic fish-based aquatic mobile sensor networks. Constraints on size, weight, and onboard ...
Stephan Shatara, Xiaobo Tan, Ernest Mbemmo, Nathan...
ICANN
2009
Springer
14 years 17 days ago
Profiling of Mass Spectrometry Data for Ovarian Cancer Detection Using Negative Correlation Learning
This paper proposes a novel Mass Spectrometry data profiling method for ovarian cancer detection based on negative correlation learning (NCL). A modified Smoothed Nonlinear Energy ...
Shan He, Huanhuan Chen, Xiaoli Li, Xin Yao
KI
2010
Springer
13 years 6 months ago
Situation-Specific Intention Recognition for Human-Robot Cooperation
Recognizing human intentions is part of the decision process in many technical devices. In order to achieve natural interaction, the required estimation quality and the used comput...
Peter Krauthausen, Uwe D. Hanebeck
NDSS
1999
IEEE
14 years 1 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot