• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 77
Next 10 →

unknown title

by unknown authors
"... ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi- ..."
Abstract - Add to MetaCart
ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi-

Digital Repository @ Iowa State University

by David Michael Failing, David Michael Failing, Jonathan D. H. Smith, Sung-yell Song
"... Commutative, idempotent groupoids and the ..."
Abstract - Add to MetaCart
Commutative, idempotent groupoids and the

permission. Structured Codes in Information Theory: MIMO and Network Applications

by Jiening Zhan, Jiening Zhan, Jiening Zhan, Jiening Zhan
"... All rights reserved. ..."
Abstract - Add to MetaCart
All rights reserved.

GAUSSIAN NETWORKS

by J. N. Laneman, V. Gupta Co-director
"... by Utsaw Kumar The presence of inexpensive and powerful sensing and communication devices has made it possible to deploy large scale distributed systems for a variety of applications. Interactions among different components of such a system include communication of information and controlling dynami ..."
Abstract - Add to MetaCart
by Utsaw Kumar The presence of inexpensive and powerful sensing and communication devices has made it possible to deploy large scale distributed systems for a variety of applications. Interactions among different components of such a system include communication of information and controlling

1 An Algebraic Approach to Physical-Layer Network Coding

by Chen Feng, Danilo Silva, Frank R. Kschischang
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

On the Definitions of Cryptographic Security: Chosen-Ciphertext Attack Revisited

by unknown authors , 1999
"... ..."
Abstract - Add to MetaCart
Abstract not found

Contents

by Maxwell Krohn, Michael O. Rabin, Michael Mitzenmacher , 1999
"... 1.1 Private and Public Key Cryptography..................... 5 ..."
Abstract - Add to MetaCart
1.1 Private and Public Key Cryptography..................... 5

DOCTEUR EN SCIENCES

by Bhaskar Biswas, Bhaskar Biswas , 2010
"... Implementational aspects of code-based cryptography ..."
Abstract - Add to MetaCart
Implementational aspects of code-based cryptography

RICE UNIVERSITY Regime Change: Sampling Rate vs. Bit-Depth in Compressive Sensing

by Jason Noah Laska , 2011
"... The compressive sensing (CS) framework aims to ease the burden on analog-to-digital converters (ADCs) by exploiting inherent structure in natural and man-made signals. It has been demon-strated that structured signals can be acquired with just a small number of linear measurements, on the order of t ..."
Abstract - Add to MetaCart
. We develop a new theoretical framework to analyze this extreme case and develop new algorithms for signal reconstruction from such coarsely quantized measurements. The 1-bit CS framework leads us to scenarios where it may be more appropriate to reduce bit-depth instead of sampling rate. We find

1Non-Invertible Gabor Transforms

by Ewa Matusiak, Tomer Michaeli, Student Member, Yonina C. Eldar, Senior Member
"... Time-frequency analysis, such as the Gabor transform, plays an important role in many signal processing applications. The redundancy of such representations is often directly related to the computational load of any algorithm operating in the transform domain. To reduce complexity, it may be desirab ..."
Abstract - Add to MetaCart
Time-frequency analysis, such as the Gabor transform, plays an important role in many signal processing applications. The redundancy of such representations is often directly related to the computational load of any algorithm operating in the transform domain. To reduce complexity, it may
Next 10 →
Results 1 - 10 of 77
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University