Results 1  10
of
755,582
Cooperative strategies and capacity theorems for relay networks
 IEEE TRANS. INFORM. THEORY
, 2005
"... Coding strategies that exploit node cooperation are developed for relay networks. Two basic schemes are studied: the relays decodeandforward the source message to the destination, or they compressandforward their channel outputs to the destination. The decodeandforward scheme is a variant of ..."
Abstract

Cited by 725 (19 self)
 Add to MetaCart
outputs and the destination’s channel output. The strategies are applied to wireless channels, and it is shown that decodeandforward achieves the ergodic capacity with phase fading if phase information is available only locally, and if the relays are near the source node. The ergodic capacity coincides
On the Gers̆gorin Theorem Applied to Radar Polarimetry
"... Abstract — This contribution is concerned with the mathematical formulation and theoretical background of the Gers̆gorin theory in the context of Radar Polarimetry. Named after its founder Semian A. Gers̆gorin the Gers̆gorin theorem basically states that there are certain regions in the complex plan ..."
Abstract
 Add to MetaCart
Abstract — This contribution is concerned with the mathematical formulation and theoretical background of the Gers̆gorin theory in the context of Radar Polarimetry. Named after its founder Semian A. Gers̆gorin the Gers̆gorin theorem basically states that there are certain regions in the complex
An axiomatic basis for computer programming
 COMMUNICATIONS OF THE ACM
, 1969
"... In this paper an attempt is made to explore the logical foundations of computer programming by use of techniques which were first applied in the study of geometry and have later been extended to other branches of mathematics. This involves the elucidation of sets of axioms and rules of inference w ..."
Abstract

Cited by 1732 (4 self)
 Add to MetaCart
In this paper an attempt is made to explore the logical foundations of computer programming by use of techniques which were first applied in the study of geometry and have later been extended to other branches of mathematics. This involves the elucidation of sets of axioms and rules of inference
The irreducibility of the space of curves of given genus
 Publ. Math. IHES
, 1969
"... Fix an algebraically closed field k. Let Mg be the moduli space of curves of genus g over k. The main result of this note is that Mg is irreducible for every k. Of course, whether or not M s is irreducible depends only on the characteristic of k. When the characteristic s o, we can assume that k ~ ..."
Abstract

Cited by 503 (2 self)
 Add to MetaCart
; for abelian varieties. This result was first proved independently in char. o by Grothendieck, using methods of etale cohomology (private correspondence with J. Tate), and by Mumford, applying the easy half of Theorem (2.5), to go from curves to abelian varieties (cf. [M2]). Grothendieck has recently
Model Checking Programs
, 2003
"... The majority of work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it easier to experiment with mechanized formal methods such as theorem provers, proof checkers and model checkers. In this pape ..."
Abstract

Cited by 582 (63 self)
 Add to MetaCart
The majority of work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it easier to experiment with mechanized formal methods such as theorem provers, proof checkers and model checkers
The mathematics of infectious diseases
 SIAM Review
, 2000
"... Abstract. Many models for the spread of infectious diseases in populations have been analyzed mathematically and applied to specific diseases. Threshold theorems involving the basic reproduction number R0, the contact number σ, and the replacement number R are reviewed for the classic SIR epidemic a ..."
Abstract

Cited by 470 (4 self)
 Add to MetaCart
Abstract. Many models for the spread of infectious diseases in populations have been analyzed mathematically and applied to specific diseases. Threshold theorems involving the basic reproduction number R0, the contact number σ, and the replacement number R are reviewed for the classic SIR epidemic
Recursive Functions of Symbolic Expressions and Their Computation by Machine, Part I
, 1960
"... this paper in L a T E Xpartly supported by ARPA (ONR) grant N000149410775 to Stanford University where John McCarthy has been since 1962. Copied with minor notational changes from CACM, April 1960. If you want the exact typography, look there. Current address, John McCarthy, Computer Science Depa ..."
Abstract

Cited by 451 (3 self)
 Add to MetaCart
this formalism has advantages both as a programming language and as a vehicle for developing a theory of computation. Next, we describe Sexpressions and Sfunctions, give some examples, and then describe the universal Sfunction apply which plays the theoretical role of a universal Turing machine
Variational algorithms for approximate Bayesian inference
, 2003
"... The Bayesian framework for machine learning allows for the incorporation of prior knowledge in a coherent way, avoids overfitting problems, and provides a principled basis for selecting between alternative models. Unfortunately the computations required are usually intractable. This thesis presents ..."
Abstract

Cited by 431 (8 self)
 Add to MetaCart
theorems are presented to pave the road for automated VB derivation procedures in both directed and undirected graphs (Bayesian and Markov networks, respectively). Chapters 35 derive and apply the VB EM algorithm to three commonlyused and important models: mixtures of factor analysers, linear dynamical
The Foundations of CostSensitive Learning
 In Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence
, 2001
"... This paper revisits the problem of optimal learning and decisionmaking when different misclassification errors incur different penalties. We characterize precisely but intuitively when a cost matrix is reasonable, and we show how to avoid the mistake of defining a cost matrix that is economically i ..."
Abstract

Cited by 395 (6 self)
 Add to MetaCart
incoherent. For the twoclass case, we prove a theorem that shows how to change the proportion of negative examples in a training set in order to make optimal costsensitive classification decisions using a classifier learned by a standard noncostsensitive learning method. However, we then argue
Ballot Theorems Applied to the Transient Analysis of nD/D/1 Queues
 IEEE/ACM Transactions on Networking
, 1992
"... The problem of transporting constant bitrate (CBR) traffic through a packet network is analyzed. In the system considered, CBR traffic is packetized and packets from several similar sources are multiplexed on a transmission link. The bitstreams are recreated at the receiving end by demultiplexing ..."
Abstract

Cited by 20 (0 self)
 Add to MetaCart
present a method of analysis, based on the Ballot Theorems, to provide steady state delay distributions as well as a transient analysis of the system to predict the statistics of the time for a gap to develop in the CBR stream as a function of the smoothing delay. 1 Department of Electrical Engineering
Results 1  10
of
755,582