搜索结果: 136-150 共查到“知识库 通信网络技术”相关记录1343条 . 查询时间(4.103 秒)
Communication Complexity of Computing the Hamming Distance
communication complexity randomized protocol Hamming distance combinatorial
2015/8/14
Let x, y {0, 1} n. Persons A and B are given x and y respectively. They communicate in order that both find the Hamming Distance d(x,y). Three communication models, viz, deterministic, e-error and e-r...
Achievable Rates for Multiple Descriptions.
A two-bit scheme for routing lookup
Routers links routing search engines binary search access
2015/8/11
Performing address lookup at a router has become a severe bottleneck. This is because increasing link speeds leave very little time to lookup an address, and an explosion in the number of hosts has le...
Bandwidth extension in CMOS with optimized on-chip inductors
Gigahertz bandwidth broadband circuits spiral inductors elements inductor series resistance and inductance circuit
2015/8/11
We present a technique for enhancing the bandwidth of gigahertz broadband circuitry by using optimized on-chip spiral inductors as shunt-peaking elements. The series resistance of the on-chip inductor...
Resource allocation for QoS provisioning in wireless ad hoc networks
Reflection wireless network transmission data rate the network resources
2015/8/11
For wireless ad hoc networks with multihop transmissions and Rayleigh fading, this paper maximizes the overall system throughput subject to QoS constraints on power, probability of outage, and data ra...
Fast linear iterations for distributed averaging
Distributed consensus Linear system Spectral radius Graph Laplacian Semide!nite programming
2015/8/11
We consider the problem of finding a linear iteration that yields distributed averaging consensus over a network, i.e., that asymptotically computes the average of some initial values given at the nod...
Optimal routes and flows in congestion constrained ad hoc networks
Network streaming media video voice data Internet function
2015/8/11
Future ad hoc and multi-hop networks will simultaneously support many different types of traffic such as streaming video, voice, and data. This is particularly true for emerging 802.11, bluetooth, or ...
Optimal scaling of a gradient method for distributed resource allocation
Distributed optimization resource allocations weighted gradient methods convergence rates semidefinite programming
2015/8/10
We consider a class of weighted gradient methods for distributed resource allocation over a network. Each node of the network is associated with a local variable and a convex cost function; the sum of...
An interior-point method for large-scale network utility maximization
Newton the interior point networks concave utility functions disperse method dual decomposition algorithm
2015/8/10
We describe a specialized truncated Newton primal-dual interior-point method that solves large scale network utility maximization problems, with concave utility functions, efficiently and reliably. Ou...
Dynamic network utility maximization with delivery contracts
Variation of network the matrix the flow the numerical values
2015/8/10
We consider a multi-period variation of the network utility maximization problem that includes delivery constraints. We allow the flow utilities, link capacities and routing matrices to vary over time...
Optimizing adaptive modulation in wireless networks via utility maximization
Adaptive modulation network power physical layer electric power the interest rate
2015/8/10
We investigate adaptive modulation using the network utility maximization framework. We derive new crosslayer optimal power and rate adaptation policies for several practical modulation schemes. The b...
SANE: A protection architecture for enterprise networks
enterprise networks protection architecture
2015/8/5
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users. Our system generate...
车载网络中安全有效分布式的假名生成
匿名 不可伪造 盲签名 假名生成
2015/7/30
提出了一种RSU协助的分布式假名生成方法。首先,车辆用户生成自己的临时公钥,当经过RSU时,由RSU对其临时公钥进行盲签名;然后,车辆得到RSU对自己临时公钥的签名,并将该签名与临时公钥一起构成车辆的一个假名(临时公钥+RSU对临时公钥的签名),通过该假名与周围节点进行通信。本方法的优势在于:一方面RSU能够分担VANET中认证中心(CA)的负担,有效地提高了系统的效率、增强了系统的可扩展性;另一...
Ideology and Online News
news internet echo chambers
2015/7/17
News consumption is moving online. If this move fundamentally changes how news is produced and consumed it will have important ramifications for politics. In this chapter we formulate a model of...
INFORMATION, NETWORKS AND INFORMAL INSURANCE: EVIDENCE FROM A LAB EXPERIMENT IN THE FIELD
Asymmetric information insurance social networks
2015/7/15
When communities engage in risk-sharing with asymmetric information, wherein
a member of a risk-sharing group is unable to verify the income and shocks experienced by
the others, they are unable to ...