Sciweavers

CORR
2008
Springer
115views Education» more  CORR 2008»
13 years 8 months ago
Adaptive Sum Power Iterative Waterfilling for MIMO Cognitive Radio Channels
Abstract--In this paper, the sum capacity of the Gaussian Multiple Input Multiple Output (MIMO) Cognitive Radio Channel (MCC) is expressed as a convex problem with finite number of...
Rajiv Soundararajan, Sriram Vishwanath
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 8 months ago
Is Witsenhausen's counterexample a relevant toy?
This paper answers a question raised by Doyle on the relevance of the Witsenhausen counterexample as a toy decentralized control problem. The question has two sides, the first of w...
Pulkit Grover, Anant Sahai
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 8 months ago
INDECT Advanced Security Requirements
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Manuel Urueña, Petr Machnik, Maria Martinez...
CORR
2008
Springer
104views Education» more  CORR 2008»
13 years 8 months ago
New bounds on classical and quantum one-way communication complexity
In this paper we provide new bounds on classical and quantum distributional communication complexity in the two-party, one-way model of communication. In the classical one-way mode...
Rahul Jain, Shengyu Zhang
CORR
2008
Springer
74views Education» more  CORR 2008»
13 years 8 months ago
Analysis of the Karmarkar-Karp Differencing Algorithm
The Karmarkar-Karp differencing algorithm is the best known polynomial time heuristic for the number partitioning problem, fundamental in both theoretical computer science and stat...
Stefan Boettcher, Stephan Mertens
CORR
2010
Springer
122views Education» more  CORR 2010»
13 years 8 months ago
Facility Location with Client Latencies: Linear-Programming based Techniques for Minimum-Latency Problems
We introduce a problem that is a common generalization of the uncapacitated facility location (UFL) and minimum latency (ML) problems, where facilities not only need to be opened ...
Deeparnab Chakrabarty, Chaitanya Swamy
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 8 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
CORR
2010
Springer
168views Education» more  CORR 2010»
13 years 8 months ago
Network evolution and QOS provisioning for integrated femtocell/macrocell networks
Integrated femtocell/macrocell networks, comprising a conventional cellular network overlaid with femtocells, offer an economically appealing way to improve coverage, quality of s...
Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J...
CORR
2008
Springer
94views Education» more  CORR 2008»
13 years 8 months ago
A Toolkit for Scalable Spreadsheet Visualization
This paper presents a toolkit for spreadsheet visualization based on logical areas, semantic classes and data Logical areas, semantic classes and data modules are abstract represe...
Markus Clermont
CORR
2008
Springer
84views Education» more  CORR 2008»
13 years 8 months ago
A Paradigm for Spreadsheet Engineering Methodologies
Spreadsheet engineering methodologies are diverse and sometimes contradictory. It is difficult for spreadsheet developers to identify a spreadsheet engineering methodology that is...
Thomas A. Grossman, Ozgur Ozluk