Sciweavers

CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 8 months ago
Finite-SNR Diversity-Multiplexing Tradeoff via Asymptotic Analysis of Large MIMO Systems
Abstract--Diversity-multiplexing tradeoff (DMT) was characterized asymptotically (SNR-> infinity) for i.i.d. Rayleigh fading channel by Zheng and Tse [1]. The SNR-asymptotic DMT...
Sergey Loyka, George Levin
CORR
2008
Springer
96views Education» more  CORR 2008»
13 years 8 months ago
Linear programming bounds for unitary space time codes
The linear programming method is applied to the space Un(C) of unitary matrices in order to obtain bounds for codes relative to the diversity sum and the diversity product. Theore...
Jean Creignou, Hervé Diet
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 8 months ago
Deriving Specifications of Dependable Systems: toward a Method
Abstract--This paper proposes a method for deriving formal specifications of systems. To accomplish this task we pass through a non trivial number of steps, concepts and tools wher...
Manuel Mazzara
CORR
2010
Springer
44views Education» more  CORR 2010»
13 years 8 months ago
Smoothness, Low-Noise and Fast Rates
Nathan Srebro, Karthik Sridharan, Ambuj Tewari
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 8 months ago
Secure Lossy Source Coding with Side Information at the Decoders
This paper investigates the problem of secure lossy source coding in the presence of an eavesdropper with arbitrary correlated side informations at the legitimate decoder (referre...
Joffrey Villard, Pablo Piantanida
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 8 months ago
Secure Lossless Compression with Side Information
Secure data compression in the presence of side information at both a legitimate receiver and an eavesdropper is explored. A noise-free, limited rate link between the source and th...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
CORR
2010
Springer
84views Education» more  CORR 2010»
13 years 8 months ago
Outage Probability for Multi-Cell Processing under Rayleigh Fading
Abstract--Multi-cell processing, also called Coordinated Multiple Point (CoMP), is a very promising distributed multi-antennas technique that uses neighbour cell's antennas. T...
Virgile Garcia, Jean-Marie Gorce, Nikolai Lebedev
CORR
2008
Springer
87views Education» more  CORR 2008»
13 years 8 months ago
The Rate Loss of Single-Letter Characterization: The "Dirty" Multiple Access Channel
For general memoryless systems, the typical information theoretic solution - when exists - has a "single-letter" form. This reflects the fact that optimum performance ca...
Tal Philosof, Ram Zamir
CORR
2010
Springer
62views Education» more  CORR 2010»
13 years 8 months ago
Portability of Prolog programs: theory and case-studies
(Non-)portability of Prolog programs is widely considered as an important factor in the lack of acceptance of the language. Since
Jan Wielemaker, Vítor Santos Costa
CORR
2008
Springer
181views Education» more  CORR 2008»
13 years 8 months ago
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational f...
Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee