Sciweavers

51692 search results - page 10271 / 10339
» it 2008
Sort
View
CORR
2008
Springer
123views Education» more  CORR 2008»
13 years 10 months ago
Provenance Traces
Provenance is information about the origin, derivation, ownership, or history of an object. It has recently been studied extensively in scientific databases and other settings due...
James Cheney, Umut A. Acar, Amal Ahmed
CORR
2008
Springer
120views Education» more  CORR 2008»
13 years 10 months ago
Network Protection Codes: Providing Self-healing in Autonomic Networks Using Network Coding
Agile recovery from link failures in autonomic communication networks is essential to increase robustness, accessibility, and reliability of data transmission. However, this must b...
Salah A. Aly, Ahmed E. Kamal
CORR
2008
Springer
173views Education» more  CORR 2008»
13 years 10 months ago
Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications
In this paper, we propose a general cross-layer optimization framework in which we explicitly consider both the heterogeneous and dynamically changing characteristics of delay-sens...
Fangwen Fu, Mihaela van der Schaar
CORR
2008
Springer
109views Education» more  CORR 2008»
13 years 10 months ago
Dependence Balance Based Outer Bounds for Gaussian Networks with Cooperation and Feedback
We obtain new outer bounds on the capacity regions of the two-user multiple access channel with generalized feedback (MAC-GF) and the two-user interference channel with generalize...
Ravi Tandon, Sennur Ulukus
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 10 months ago
The MIMO Iterative Waterfilling Algorithm
Abstract--This paper considers the noncooperative maximization of mutual information in the vector Gaussian interference channel in a fully distributed fashion via game theory. Thi...
Gesualdo Scutari, Daniel Pérez Palomar, Ser...
« Prev « First page 10271 / 10339 Last » Next »