Sciweavers

12670 search results - page 2522 / 2534
» Requirements Modeling
Sort
View
COMCOM
2011
13 years 3 months ago
Reconstructing social interactions using an unreliable wireless sensor network
In the very active field of complex networks, research advances have largely been stimulated by the availability of empirical data and the increase in computational power needed ...
Adrien Friggeri, Guillaume Chelius, Eric Fleury, A...
COMCOM
2011
13 years 3 months ago
Volume-aware positioning in the context of a marine port terminal
The rapid proliferation of mobile computing devices and local wireless networks over the past few years has promoted a continuously growing interest in location-aware systems and ...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...
CORR
2011
Springer
152views Education» more  CORR 2011»
13 years 3 months ago
Topology Discovery of Sparse Random Graphs With Few Participants
We consider the task of topology discovery of sparse random graphs using end-to-end random measurements (e.g., delay) between a subset of nodes, referred to as the participants. T...
Animashree Anandkumar, Avinatan Hassidim, Jonathan...
CORR
2010
Springer
122views Education» more  CORR 2010»
13 years 3 months ago
Concavity of Mutual Information Rate for Input-Restricted Finite-State Memoryless Channels at High SNR
We consider a finite-state memoryless channel with i.i.d. channel state and the input Markov process supported on a mixing finite-type constraint. We discuss the asymptotic behavio...
Guangyue Han, Brian H. Marcus
SIAMCO
2011
13 years 3 months ago
Admissible Strategies in Semimartingale Portfolio Selection
The choice of admissible trading strategies in mathematical modelling of financial markets is a delicate issue, going back to Harrison and Kreps [HK79]. In the context of optimal...
Sara Biagini, Ales Cerný
« Prev « First page 2522 / 2534 Last » Next »