Sciweavers

CORR
2010
Springer
230views Education» more  CORR 2010»
13 years 4 months ago
Query-Efficient Locally Decodable Codes of Subexponential Length
A k-query locally decodable code (LDC) C : n N encodes each message x into a codeword C(x) such that each symbol of x can be probabilistically recovered by querying only k coordina...
Yeow Meng Chee, Tao Feng, San Ling, Huaxiong Wang,...
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 4 months ago
Satisfaction Equilibrium: A General Framework for QoS Provisioning in Self-Configuring Networks
Abstract--This paper is concerned with the concept of equilibrium and quality of service (QoS) provisioning in self-configuring wireless networks with non-cooperative radio devices...
Samir Medina Perlaza, Hamidou Tembine, Samson Lasa...
CORR
2010
Springer
258views Education» more  CORR 2010»
13 years 4 months ago
A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network
Power management is one of the vital issue in wireless sensor networks, where the lifetime of the network relies on battery powered nodes. Transmitting at high power reduces the l...
R. Valli, P. Dananjayan
CORR
2010
Springer
179views Education» more  CORR 2010»
13 years 4 months ago
Comparison of Support Vector Machine and Back Propagation Neural Network in Evaluating the Enterprise Financial Distress
Recently, applying the novel data mining techniques for evaluating enterprise financial distress has received much research alternation. Support Vector Machine (SVM) and back prop...
Ming-Chang Lee, To Chang
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 4 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 4 months ago
On extracting common random bits from correlated sources
Suppose Alice and Bob receive strings of unbiased independent but noisy bits from some random source. They wish to use their respective strings to extract a common sequence of ran...
Andrej Bogdanov, Elchanan Mossel
CORR
2010
Springer
101views Education» more  CORR 2010»
13 years 4 months ago
Binary is Good: A Binary Inference Framework for Primary User Separation in Cognitive Radio Networks
Primary users (PU) separation concerns with the issues of distinguishing and characterizing primary users in cognitive radio (CR) networks. We argue the need for PU separation in t...
Huy Anh Nguyen, Rong Zheng, Zhu Han
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 4 months ago
From Pathwidth to Connected Pathwidth
It is proven that the connected pathwidth of any graph G is at most 2
Dariusz Dereniowski
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 4 months ago
Transmit Energy Focusing for DOA Estimation in MIMO Radar with Colocated Antennas
In this paper, we propose a transmit beamspace energy focusing technique for multiple-input multiple-output (MIMO) radar with application to direction finding for multiple targets...
Aboulnasr Hassanien, Sergiy A. Vorobyov
CORR
2010
Springer
45views Education» more  CORR 2010»
13 years 4 months ago
FORM facts
J. A. M. Vermaseren