Sciweavers

CORR
2006
Springer
126views Education» more  CORR 2006»
13 years 11 months ago
Power Control for User Cooperation
For a fading Gaussian multiple access channel with user cooperation, we obtain the optimal power allocation policies that maximize the rates achievable by block Markov superpositi...
Onur Kaya, Sennur Ulukus
CORR
2006
Springer
81views Education» more  CORR 2006»
13 years 11 months ago
Low density codes achieve the rate-distortion bound
Abstract: We propose a new construction for low-density source codes with multiple parameters that can be tuned to optimize the performance of the code. In addition, we introduce a...
Emin Martinian, Martin J. Wainwright
CORR
2006
Springer
83views Education» more  CORR 2006»
13 years 11 months ago
A Multi-Relational Network to Support the Scholarly Communication Process
The general purpose of the scholarly communication process is to support the creation and dissemination of ideas within the scientific community. At a finer granularity, there exi...
Marko A. Rodriguez
CORR
2006
Springer
109views Education» more  CORR 2006»
13 years 11 months ago
Decision Making with Side Information and Unbounded Loss Functions
We consider the problem of decision-making with side information and unbounded loss functions. Inspired by probably approximately correct learning model, we use a slightly differe...
Majid Fozunbal, Ton Kalker
CORR
2006
Springer
108views Education» more  CORR 2006»
13 years 11 months ago
Mutual Information Games in Multi-user Channels with Correlated Jamming
We investigate the behavior of two users and one jammer in an additive white Gaussian noise (AWGN) channel with and without fading when they participate in a noncooperative zero-su...
Shabnam Shafiee, Sennur Ulukus
CORR
2006
Springer
90views Education» more  CORR 2006»
13 years 11 months ago
Google Web APIs - an Instrument for Webometric Analyses?
Philipp Mayr, Fabio Tosques
CORR
2006
Springer
110views Education» more  CORR 2006»
13 years 11 months ago
The topology of covert conflict
Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry bod...
Shishir Nagarja