Sciweavers

CORR
2011
Springer
184views Education» more  CORR 2011»
13 years 3 months ago
Decision-Feedback Differential Detection in Impulse-Radio Ultra-Wideband Systems
—Building upon recent approaches for detection of impulse-radio ultra-wideband (IR-UWB) based on compressed sensing (CS), we combine this approach with techniques known from adva...
Andreas Schenk, Robert F. H. Fischer
CORR
2011
Springer
155views Education» more  CORR 2011»
13 years 3 months ago
The Theory of Intervention Games for Resource Sharing in Wireless Communications
This paper develops a game-theoretic framework for the design and analysis of a new class of incentive schemes called intervention schemes. We formulate intervention games, propos...
Jaeok Park, Mihaela van der Schaar
CORR
2011
Springer
153views Education» more  CORR 2011»
13 years 3 months ago
On the Windfall and Price of Friendship: Inoculation Strategies on Social Networks
This article investigates selfish behavior in games where players are embedded in a social context. A framework is presented which allows us to measure the Windfall of Friendship...
Dominic Meier, Yvonne Anne Pignolet, Stefan Schmid...
CORR
2011
Springer
204views Education» more  CORR 2011»
13 years 3 months ago
Chameleon: A Color-Adaptive Web Browser for Mobile OLED Displays
Displays based on organic light-emitting diode (OLED) technology are appearing on many mobile devices. Unlike liquid crystal displays (LCD), OLED displays consume dramatically dif...
Mian Dong, Lin Zhong
CORR
2011
Springer
156views Education» more  CORR 2011»
13 years 3 months ago
From joint convexity of quantum relative entropy to a concavity theorem of Lieb
This paper provides a succinct proof of a 1973 theorem of Lieb that establishes the concavity of a certain trace function. The development relies on a deep result from quantum info...
Joel A. Tropp
CORR
2011
Springer
156views Education» more  CORR 2011»
13 years 3 months ago
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
: Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most o...
Anjan K., Jibi Abraham, Mamatha Jadhav V.
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 3 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
CORR
2011
Springer
201views Education» more  CORR 2011»
13 years 3 months ago
On the Weakenesses of Correlation
The correlation of the result lists provided by search engines is fundamental and it has deep and multidisciplinary ramifications. Here, we present automatic and unsupervised met...
Paolo D'Alberto, Ali Dasdan