Sciweavers

CORR
2006
Springer
116views Education» more  CORR 2006»
13 years 11 months ago
Building Scenarios for Environmental Management and Planning: An IT-Based Approach
Oftentimes, the need to build multidiscipline knowledge bases, oriented to policy scenarios, entails the involvement of stakeholders in manifold domains, with a juxtaposition of d...
Dino Borri, Domenico Camarda
CORR
2006
Springer
97views Education» more  CORR 2006»
13 years 11 months ago
Explicit Space-Time Codes Achieving The Diversity-Multiplexing Gain Tradeoff
A recent result of Zheng and Tse states that over a quasi-static channel, there exists a fundamental tradeoff, referred to as the diversity-multiplexing gain (D-MG) tradeoff, betwe...
Petros Elia, K. Raj Kumar, Sameer A. Pawar, P. Vij...
CORR
2006
Springer
83views Education» more  CORR 2006»
13 years 11 months ago
How to Beat the Adaptive Multi-Armed Bandit
The multi-armed bandit is a concise model for the problem of iterated decision-making under uncertainty. In each round, a gambler must pull one of K arms of a slot machine, withou...
Varsha Dani, Thomas P. Hayes
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 11 months ago
Outage Capacity of the Fading Relay Channel in the Low SNR Regime
In this paper we look at the outage capacity of the fading relay channel with half-duplex constraint in the low SNR regime. First we consider the scenario that the channel state i...
Amir Salman Avestimehr, David N. C. Tse
CORR
2006
Springer
94views Education» more  CORR 2006»
13 years 11 months ago
Cooperative Lattice Coding and Decoding
We propose novel lattice coding/decoding schemes for half-duplex outage-limited cooperative channels. These schemes are inspired by the cooperation protocols of Azarian et al. and ...
Arul D. Murugan, Kambiz Azarian, Hesham El Gamal
CORR
2006
Springer
129views Education» more  CORR 2006»
13 years 11 months ago
On the Optimality of the ARQ-DDF Protocol
The performance of the automatic repeat request-dynamic decode and forward (ARQ-DDF) cooperation protocol is analyzed in two distinct scenarios. The first scenario is the multiple...
Kambiz Azarian, Hesham El Gamal, Philip Schniter
CORR
2006
Springer
131views Education» more  CORR 2006»
13 years 11 months ago
Analysis of LDGM and compound codes for lossy compression and binning
Abstract-- Recent work has suggested that low-density generator matrix (LDGM) codes are likely to be effective for lossy source coding problems. We derive rigorous upper bounds on ...
Emin Martinian, Martin J. Wainwright
CORR
2006
Springer
114views Education» more  CORR 2006»
13 years 11 months ago
Emergence Explained
Abstract. Emergence--macro-level effects from micro-level causes--is at the heart of the conflict between reductionism and functionalism. How can there be autonomous higher level l...
Russ Abbott
CORR
2006
Springer
115views Education» more  CORR 2006»
13 years 11 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski