• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 3,260
Next 10 →

AIMD algorithms and exponential functionals

by Fabrice Guillemin, Philippe Robert, Bert Zwart - Ann. Appl. Probab , 2002
"... ABSTRACT. The behavior of connection transmitting packets into a network according to a general additive-increase multiplicative-decrease (AIMD) algorithm is investigated. It is assumed that loss of packets occurs in clumps. When a packet is lost, a certain number of subsequent packets are also lost ..."
Abstract - Cited by 56 (6 self) - Add to MetaCart
ABSTRACT. The behavior of connection transmitting packets into a network according to a general additive-increase multiplicative-decrease (AIMD) algorithm is investigated. It is assumed that loss of packets occurs in clumps. When a packet is lost, a certain number of subsequent packets are also

On Randomized Network Coding

by Tracey Ho, Muriel Medard, Jun Shi, Michelle Effros, David R. Karger - In Proceedings of 41st Annual Allerton Conference on Communication, Control, and Computing , 2003
"... We consider a randomized network coding approach for multicasting from several sources over a network, in which nodes independently and randomly select linear mappings from inputs onto output links over some field. This approach was first described in [3], which gave, for acyclic delay-free netwo ..."
Abstract - Cited by 200 (35 self) - Add to MetaCart
-free networks, a bound on error probability, in terms of the number of receivers and random coding output links, that decreases exponentially with code length. The proof was based on a result in [2] relating algebraic network coding to network flows. In this paper, we generalize these results to networks

On recurrence coefficients for rapidly decreasing exponential weights

by E. Levin, D. S. Lubinsky - J. Approx. Theory
"... Abstract. Let, for example, W (x) = exp exp k 1 x 2, x 2 [ 1; 1] where> 0, k 1; and exp k = exp (exp (::: exp ())) denotes the kth iterated exponential. Let fAng denote the recurrence coe ¢-cients in the recurrence relation xpn (x) = Anpn+1 (x) + An 1pn 1 (x) for the orthonormal polynomials fpn ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Abstract. Let, for example, W (x) = exp exp k 1 x 2, x 2 [ 1; 1] where> 0, k 1; and exp k = exp (exp (::: exp ())) denotes the kth iterated exponential. Let fAng denote the recurrence coe ¢-cients in the recurrence relation xpn (x) = Anpn+1 (x) + An 1pn 1 (x) for the orthonormal polynomials

Exponential grids in high-dimensional space

by Peter R. Brune, Matthew G. Knepley, L. Ridgway Scott , 2011
"... We consider the approximation of functions that are localized in space. We show that it is possible to define meshes to approximate such functions with the property that the number of vertices grows only linearly in dimension. In one dimension, we discuss the optimal mesh for approximating exponenti ..."
Abstract - Add to MetaCart
exponentially decreasing functions. We review the use of Cartesian product grids in multiple dimensions introduced in a paper of Bank and Scott [4].

Proactive Serving Decreases User Delay Exponentially

by Shaoquan Zhang, Longbo Huang, Minghua Chen, Xin Liu
"... In online service systems, the delay experienced by a user from the service request to the service completion is one of the most critical performance metrics. To improve user de-lay experience, recent industrial practice suggests a modern system design mechanism: proactive serving, where the sys-tem ..."
Abstract - Add to MetaCart
-tem predicts future user requests and allocates its capacity to serve these upcoming requests proactively. In this pa-per, we investigate the fundamentals of proactive serving from a theoretical perspective. In particular, we show that proactive serving decreases average delay exponentially (as a function

Comparing elliptic curve cryptography and RSA on 8bit CPUs

by Nils Gura, Arun Patel, Arvinderpal W, Hans Eberle, Sheueling Chang Shantz - in Proc. of the Sixth Workshop on Crypto- graphic Hardware and Embedded Systems (CHES’04 , 2004
"... Abstract. Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by crypto-graphic hardware. We revisited this statement and implemented elliptic curve point multiplication for 160-bit, 192-bit, and 224-bit NIST/SECG curves over GF ..."
Abstract - Cited by 189 (2 self) - Add to MetaCart
hardware acceleration. On an Atmel ATmega128 at 8 MHz we measured 0.81s for 160-bit ECC point multiplication and 0.43s for a RSA-1024 operation with exponent e = 216 +1. 2. The relative performance advantage of ECC point multi-plication over RSA modular exponentiation increases with the decrease

The ultra-wide bandwidth indoor channel: from statistical model to simulations

by Dajana Cassioli, Moe Z. Win, Andreas F. Molisch - IEEE J. SEL. AREAS COMMUN , 2002
"... We establish a statistical model for the ultra-wide bandwidth (UWB) indoor channel based on an extensive measurement campaign in a typical modern office building with 2-ns delay resolution. The approach is based on the investigation of the statistical properties of the multipath profiles measured i ..."
Abstract - Cited by 185 (13 self) - Add to MetaCart
in different rooms over a finely spaced measurement grid. The analysis leads to the formulation of a stochastic tapped-delay-line (STDL) model of the UWB indoor channel. The averaged power delay profile can be well-modeled by a single exponential decay with a statistically distributed decay constant. The small

Fixed energy inverse problem for exponentially decaying potentials

by Gunther Uhlmann, András Vasy - Methods and Applications of Analysis
"... In this paper we show that in two-body scattering the scattering matrix at a fixed energy determines real-valued exponentially decreasing potentials. This result has been proved by Novikov previously [4], see also [3], using a ∂-equation. We present a different method, which combines a density argum ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
In this paper we show that in two-body scattering the scattering matrix at a fixed energy determines real-valued exponentially decreasing potentials. This result has been proved by Novikov previously [4], see also [3], using a ∂-equation. We present a different method, which combines a density

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
prediction of the future reward together with the contingency that associates the behavioral action to the reward Motivational Valence Punishers have opposite valence to rewards, induce withdrawal behavior, and act as negative reinforcers by increasing the behavior that results in decreasing the aversive

The estimation of the model order in exponential families

by Neri Merhav - IEEE Trans. Inform. Theory , 1989
"... Abstract-The estimation of the model order in exponential families is studied. Estimators are sought that achieve high exponential rate of decrease in the underestimation probability while keeping the overestimation probability exponent at a certain prescribed level. It is assumed that a ..."
Abstract - Cited by 30 (6 self) - Add to MetaCart
Abstract-The estimation of the model order in exponential families is studied. Estimators are sought that achieve high exponential rate of decrease in the underestimation probability while keeping the overestimation probability exponent at a certain prescribed level. It is assumed that a
Next 10 →
Results 21 - 30 of 3,260
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University