Results 11  20
of
6,931
Dual methods for nonconvex spectrum optimization of multicarrier systems
 IEEE TRANS. COMMUN
, 2006
"... The design and optimization of multicarrier communications systems often involve a maximization of the total throughput subject to system resource constraints. The optimization problem is numerically difficult to solve when the problem does not have a convexity structure. This paper makes progress ..."
Abstract

Cited by 201 (7 self)
 Add to MetaCart
toward solving optimization problems of this type by showing that under a certain condition called the timesharing condition, the duality gap of the optimization problem is always zero, regardless of the convexity of the objective function. Further, we show that the timesharing condition is satisfied
The multiplicative weights update method: a meta algorithm and applications
, 2005
"... Algorithms in varied fields use the idea of maintaining a distribution over a certain set and use the multiplicative update rule to iteratively change these weights. Their analysis are usually very similar and rely on an exponential potential function. We present a simple meta algorithm that unifies ..."
Abstract

Cited by 147 (13 self)
 Add to MetaCart
Algorithms in varied fields use the idea of maintaining a distribution over a certain set and use the multiplicative update rule to iteratively change these weights. Their analysis are usually very similar and rely on an exponential potential function. We present a simple meta algorithm
Markov Chain Monte Carlo Estimation of Exponential Random
 Graph Models,” Journal of Social Structure,
, 2002
"... Abstract This paper is about estimating the parameters of the exponential random graph model, also known as the p * model, using frequentist Markov chain Monte Carlo (MCMC) methods. The exponential random graph model is simulated using Gibbs or MetropolisHastings sampling. The estimation procedures ..."
Abstract

Cited by 185 (19 self)
 Add to MetaCart
procedures considered are based on the RobbinsMonro algorithm for approximating a solution to the likelihood equation. A major problem with exponential random graph models resides in the fact that such models can have, for certain parameter values, bimodal (or multimodal) distributions for the sufficient
Risky families: Family social environments and the mental and physical health of offspring
 Psychological Bulletin
, 2002
"... Risky families are characterized by conflict and aggression and by relationships that are cold, unsupportive, and neglectful. These family characteristics create vulnerabilities and/or interact with genetically based vulnerabilities in offspring that produce disruptions in psychosocial functioning ( ..."
Abstract

Cited by 185 (7 self)
 Add to MetaCart
, the family is charged with responsibilities for the care and development of the child. In healthy families, children learn that they can count on the environment to provide for their emotional security and their physical safety and wellbeing, and they acquire behaviors that will eventually allow them
An Updating Algorithm for Subspace Tracking
 IEEE Trans. Signal Processing
, 1992
"... In certain signal processing applications it is required to compute the null space of a matrix whose rows are samples of a signal with p components. The usual tool for doing this is the singular value decomposition. However, the singular value decomposition has the drawback that it requires O(p 3 ..."
Abstract

Cited by 114 (14 self)
 Add to MetaCart
In certain signal processing applications it is required to compute the null space of a matrix whose rows are samples of a signal with p components. The usual tool for doing this is the singular value decomposition. However, the singular value decomposition has the drawback that it requires O(p 3
Querying Imprecise Data in Moving Object Environments
 IEEE TKDE
, 2002
"... In moving object environments it is infeasible for the database tracking the movement of objects to store the exact locations of objects at all times. Typically the location of an object is known with certainty only at the time of the update. The uncertainty in its location increases until the next ..."
Abstract

Cited by 168 (35 self)
 Add to MetaCart
update. In this environment, it is possible for queries to produce incorrect results based upon old data. However, if the degree of uncertainty is controlled, then the error of the answers to certain queries can be reduced. More generally, query answers can be augmented with probabilistic estimates
A Normal Form for XML Documents
"... This paper takes a rst step towards the design and normalization theory for XML documents. We show that, like relational databases, XML documents may contain redundant information, and may be prone to update anomalies. Furthermore, such problems are caused by certain functional dependencies among p ..."
Abstract

Cited by 167 (8 self)
 Add to MetaCart
This paper takes a rst step towards the design and normalization theory for XML documents. We show that, like relational databases, XML documents may contain redundant information, and may be prone to update anomalies. Furthermore, such problems are caused by certain functional dependencies among
Join synopses for approximate query answering
 In SIGMOD
, 1999
"... In large data warehousing environments, it is often advantageous to provide fast, approximate answers to complex aggregate queries based on statistical summaries of the full data. In this paper, we demonstrate the difficulty of providing good approximate answers for joinqueries using only statistic ..."
Abstract

Cited by 169 (9 self)
 Add to MetaCart
synopses in the presence of updates to the base relations. One of our key contributions is a detailed analysis of the error bounds obtained for approximate answers that demonstrates the tradeoffs in various methods, as well as the advantages in certain scenarios of a new subsampling method we propose. Our
Compiling with Proofs
, 1998
"... One of the major challenges of building software systems is to ensure that the various components fit together in a welldefined manner. This problem is exacerbated by the recent advent of software components whose origin is unknown or inherently untrusted, such as mobile code or user extensions ..."
Abstract

Cited by 150 (9 self)
 Add to MetaCart
and security problems with techniques from mathematical logic and programminglanguage semantics. I propose a framework, called proofcarrying code, in which the extension provider sends along with the extension code a representation of a formal proof that the code meets certain safety and correctness
Multiple counters automata, safety analysis and Presburger arithmetic
, 1998
"... We consider automata with counters whose values are updated according to signals sent by the environment. A transition can be fired only if the values of the counters satisfy some guards (the guards of the transition). We consider guards of the form y i #y j +c i;j where y i is either x 0 i or ..."
Abstract

Cited by 111 (1 self)
 Add to MetaCart
We consider automata with counters whose values are updated according to signals sent by the environment. A transition can be fired only if the values of the counters satisfy some guards (the guards of the transition). We consider guards of the form y i #y j +c i;j where y i is either x 0 i
Results 11  20
of
6,931