• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 100
Next 10 →

Feedback Communication Systems: Fundamental Limits and Control-Theoretic Approach

by Ehsan Ardestanizadeh, All Rights Reserved , 2010
"... Copyright ..."
Abstract - Add to MetaCart
Abstract not found

Subspace Communication

by Josep Font-segura, Prof Gregori , 2014
"... We are surrounded by electronic devices that take advantage of wireless technologies, from our computer mice, which require little amounts of information, to our cellphones, which demand increasingly higher data rates. Until today, the coexistence of such a variety of services has been guaranteed by ..."
Abstract - Add to MetaCart
We are surrounded by electronic devices that take advantage of wireless technologies, from our computer mice, which require little amounts of information, to our cellphones, which demand increasingly higher data rates. Until today, the coexistence of such a variety of services has been guaranteed

unknown title

by unknown authors
"... ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi- ..."
Abstract - Add to MetaCart
ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi-

1Generalized Signal Alignment: On the Achievable DoF for Multi-User MIMO Two-Way Relay Channels

by Kangqi Liu, Student Member, Meixia Tao, Senior Member
"... Abstract—This paper studies the achievable degrees of freedom (DoF) for multi-user multiple-input multiple-output (MIMO) two-way relay channels, where there are K source nodes, each equipped with M antennas, one relay node, equipped with N antennas, and each source node exchanges independent message ..."
Abstract - Add to MetaCart
messages with an arbitrary set of other source nodes via the relay. By allowing an arbitrary information exchange pattern, the consid-ered channel model is a unified one. It includes several existing channel models as special cases:K-user MIMO Y channel, multi-pair MIMO two-way relay channel, generalized

1Capacity Theorems for the Fading Interference Channel with a Relay and Feedback Links

by Daniel Zahavi, Ron Dabora
"... Abstract—Handling interference is one of the main challenges in the design of wireless networks. One of the key approaches to interference management is node cooperation, which can be classified into two main types: relaying and feedback. In this work we consider simultane-ous application of both co ..."
Abstract - Add to MetaCart
) feedback from both receivers to the relay, (2) feedback from each receiver to the relay and to one of the transmitters (either corresponding or opposite), (3) feedback from one of the receivers to the relay, (4) feedback from one of the receivers to the relay and to one of the transmitters. Our results

RICE UNIVERSITY Regime Change: Sampling Rate vs. Bit-Depth in Compressive Sensing

by Jason Noah Laska , 2011
"... The compressive sensing (CS) framework aims to ease the burden on analog-to-digital converters (ADCs) by exploiting inherent structure in natural and man-made signals. It has been demon-strated that structured signals can be acquired with just a small number of linear measurements, on the order of t ..."
Abstract - Add to MetaCart
The compressive sensing (CS) framework aims to ease the burden on analog-to-digital converters (ADCs) by exploiting inherent structure in natural and man-made signals. It has been demon-strated that structured signals can be acquired with just a small number of linear measurements, on the order of the signal complexity. In practice, this enables lower sampling rates that can be more easily achieved by current hardware designs. The primary bottleneck that limits ADC sam-pling rates is quantization, i.e., higher bit-depths impose lower sampling rates. Thus, the decreased sampling rates of CS ADCs accommodate the otherwise limiting quantizer of conventional ADCs. In this thesis, we consider a different approach to CS ADC by shifting towards lower quantizer bit-depths rather than lower sampling rates. We explore the extreme case where each measurement is quantized to just one bit, representing its sign. We develop a new theoretical framework to analyze this extreme case and develop new algorithms for signal reconstruction from such coarsely quantized measurements. The 1-bit CS framework leads us to scenarios where it may be more appropriate to reduce bit-depth instead of sampling rate. We find that there exist two distinct regimes of operation that correspond to high/low signal-to-noise ratio (SNR). In the measurement

Composition du Jury

by Eric Chaumette, Cédric Richard, Professeur Universités, Yannick Berthoumieu, Professeur Universités, Pascal Chevalier Professeur, Pascal Larzabal, Professeur Universités
"... Caractérisation des problèmes conjoints de détection et d'estimation ..."
Abstract - Add to MetaCart
Caractérisation des problèmes conjoints de détection et d'estimation

Contents

by Maxwell Krohn, Michael O. Rabin, Michael Mitzenmacher , 1999
"... 1.1 Private and Public Key Cryptography..................... 5 ..."
Abstract - Add to MetaCart
1.1 Private and Public Key Cryptography..................... 5

Guaranteeing Communication Quality in Real World WSN Deployments

by Fbk-irst Bruno, Kessler Foundation, Matteo Ceriotti, Dr. Amy, L. Murphy, Bruno Kessler Foundation (fbk-irst, Amy L. Murphy, Prof Prabal Dutta, Prof Koen Langendoen, Prof Leo Selavo
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract - Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:

On the Definitions of Cryptographic Security: Chosen-Ciphertext Attack Revisited

by unknown authors , 1999
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 100
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University