Sciweavers

CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 18 days ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
CORR
2008
Springer
154views Education» more  CORR 2008»
14 years 18 days ago
Sponsored Search Auctions with Markovian Users
Abstract. Sponsored search involves running an auction among advertisers who bid in order to have their ad shown next to search results for specific keywords. The most popular auct...
Gagan Aggarwal, Jon Feldman, S. Muthukrishnan, Mar...
CORR
2008
Springer
126views Education» more  CORR 2008»
14 years 18 days ago
3D Building Model Fitting Using A New Kinetic Framework
We describe a new approach to fit the polyhedron describing a 3D building model to the point cloud of a Digital Elevation Model (DEM). We introduce a new kinetic framework that hi...
Mathieu Brédif, Didier Boldo, Marc Pierrot ...
CORR
2008
Springer
121views Education» more  CORR 2008»
14 years 18 days ago
Cascaded Orthogonal Space-Time Block Codes for Wireless Multi-Hop Relay Networks
Distributed space-time block coding is a diversity technique to mitigate the effects of fading in multi-hop wireless networks, where multiple relay stages are used by a source to ...
Rahul Vaze, Robert W. Heath Jr.
CORR
2008
Springer
106views Education» more  CORR 2008»
14 years 18 days ago
Infinity-Norm Sphere-Decoding
Abstract--Promising approaches for efficient detection in multiple-input multiple-output (MIMO) wireless systems are based on sphere-decoding (SD). The conventional (and optimum) n...
Dominik Seethaler, Helmut Bölcskei
CORR
2008
Springer
138views Education» more  CORR 2008»
14 years 18 days ago
On the Capacity of Free-Space Optical Intensity Channels
New upper and lower bounds are presented on the capacity of the free-space optical intensity channel. This channel is characterized by inputs that are nonnegative (representing the...
Amos Lapidoth, Stefan M. Moser, Michele A. Wigger
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 18 days ago
The Gaussian MAC with Conferencing Encoders
We derive the capacity region of the Gaussian version of Willems's two-user MAC with conferencing encoders. This setting differs from the classical MAC in that, prior to each ...
Shraga I. Bross, Amos Lapidoth, Michele A. Wigger
CORR
2008
Springer
57views Education» more  CORR 2008»
14 years 18 days ago
Efficient recovering of operation tables of black box groups and rings
Jens Zumbragel, Gérard Maze, Joachim Rosent...
CORR
2008
Springer
144views Education» more  CORR 2008»
14 years 18 days ago
Iterative Hard Thresholding for Compressed Sensing
Compressed sensing is a technique to sample compressible signals below the Nyquist rate, whilst still allowing near optimal reconstruction of the signal. In this paper we present ...
Thomas Blumensath, Mike E. Davies