Sciweavers

1222 search results - page 231 / 245
» corr 2008
Sort
View
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 4 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
CORR
2008
Springer
141views Education» more  CORR 2008»
15 years 4 months ago
Distributed Source Coding using Abelian Group Codes
In this work, we consider a distributed source coding problem with a joint distortion criterion depending on the sources and the reconstruction. This includes as a special case the...
Dinesh Krithivasan, S. Sandeep Pradhan
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 4 months ago
Sparse Recovery by Non-convex Optimization -- Instance Optimality
In this note, we address the theoretical properties of p, a class of compressed sensing decoders that rely on p minimization with p (0, 1) to recover estimates of sparse and compr...
Rayan Saab, Özgür Yilmaz
CORR
2008
Springer
85views Education» more  CORR 2008»
15 years 4 months ago
Occupancy distributions of homogeneous queueing systems under opportunistic scheduling
This paper analyzes opportunistic schemes for transmission scheduling from one of n homogeneous queues whose channel states fluctuate independently. Considered schemes consist of ...
Murat Alanyali, Maxim Dashouk
157
Voted
CORR
2008
Springer
73views Education» more  CORR 2008»
15 years 4 months ago
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and multiple receivers in a broadcast channel in the presence of an eavesdropper. Characterizing the secrecy ca...
Ersen Ekrem, Sennur Ulukus