Sam Cotton | Rail Wars! | Aitana Sánchez-Gijón
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Resource Allocation and Cross Layer Control in Wireless Networks
Resource Allocation and Cross Layer Control in Wireless Networks
Resource Allocation and Cross Layer Control in Wireless Networks presents abstract models that capture the cross layer interaction from the physical to transport layer in wireless network architectures including cellular, ad-hoc and sensor networks as well as hybrid wireless-wireline. The emphasis in the presentation is on describing the models and...
Average-Case Complexity (Foundations and Trends(R) in Theoretical Computer Science)
Average-Case Complexity (Foundations and Trends(R) in Theoretical Computer Science)
Average-Case Complexity is a thorough survey of the average-case complexity of problems in NP. The study of the average-case complexity of intractable problems began in the 1970s, motivated by two distinct applications: the developments of the foundations of cryptography and the search for methods to "cope" with the intractability of...
Adaptive Query Processing (Foundations and Trends(R) in Databases)
Adaptive Query Processing (Foundations and Trends(R) in Databases)
Adaptive Query Processing surveys the fundamental issues, techniques, costs, and benefits of adaptive query processing. It begins with a broad overview of the field, identifying the dimensions of adaptive techniques. It then looks at the spectrum of approaches available to adapt query execution at runtime - primarily in a non-streaming context. The...
Pairwise Independence and Derandomization (Foundations and Trends(R) in Theoretical Computer Science)
Pairwise Independence and Derandomization (Foundations and Trends(R) in Theoretical Computer Science)
This article gives several applications of the following paradigm, which has proven extremely powerful in algorithm design and computational complexity. First, design a probabilistic algorithm for a given problem. Then, show that the correctness analysis of the algorithm remains valid even when the random strings used by the algorithm do not come...
Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis
Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis
Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis reviews methods for kinematic tracking of the human body in video. The review confines itself to the earlier stages of motion, focusing on tracking and motion synthesis. There is an extensive discussion of open issues. The authors identify some puzzling phenomena...
ALGORITHMIC RESULTS IN LIST DECODING (Foundations and Trends(R) in Theoretical Computer Science)
ALGORITHMIC RESULTS IN LIST DECODING (Foundations and Trends(R) in Theoretical Computer Science)
Algorithmic Results in List Decoding introduces and motivates the problem of list decoding, and discusses the central algorithmic results of the subject, culminating with the recent results on achieving "list decoding capacity." The main technical focus is on giving a complete presentation of the recent algebraic results achieving list...
Data Streams: Algorithms and Applications (Foundations and Trends in Theoretical Computer Science)
Data Streams: Algorithms and Applications (Foundations and Trends in Theoretical Computer Science)
Data stream algorithms as an active research agenda emerged only over the past few years, even though the concept of making few passes over the data for performing computations has been around since the early days of Automata Theory. The data stream agenda now pervades many branches of Computer Science including databases, networking, knowledge...
Architecture of a Database System
Architecture of a Database System
Database Management Systems (DBMSs) are a ubiquitous and critical component of modern computing, and the result of decades of research and development in both academia and industry. Architecture of a Database System presents an architectural discussion of DBMS design principles, including process models, parallel architecture, storage system...
Information Theory and Statistics: A Tutorial
Information Theory and Statistics: A Tutorial
Information Theory and Statistics: A Tutorial is concerned with applications of information theory concepts in statistics, in the finite alphabet setting. The topics covered include large deviations, hypothesis testing, maximum likelihood estimation in exponential families, analysis of contingency tables, and iterative algorithms with an...
Random Matrix Theory and Wireless Communications
Random Matrix Theory and Wireless Communications
Random matrix theory has found many applications in physics, statistics and engineering since its inception. Although early developments were motivated by practical experimental problems, random matrices are now used in fields as diverse as Riemann hypothesis, stochastic differential equations, condensed matter physics, statistical physics, chaotic...
Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory provides a tutorial on the basic of network coding theory. It presents the material in a transparent manner without unnecessarily presenting all the results in their full generality. Store-and-forward had been the predominant technique for transmitting information through a network until its optimality was refuted by network...
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
The vast expansion and rigorous treatment of cryptography is one of the major achievements of theoretical computer science. In particular, concepts such as computational indistinguishability, pseudorandomness and zero-knowledge interactive proofs were introduced, classical notions such as secure encryption and unforgeable signatures were placed on...
Result Page: 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy