咨询与建议

限定检索结果

文献类型

  • 15 篇 期刊文献
  • 4 篇 会议
  • 1 册 图书

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 7 篇 电气工程
    • 6 篇 信息与通信工程
    • 5 篇 计算机科学与技术...
    • 1 篇 控制科学与工程
  • 8 篇 理学
    • 8 篇 数学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...

主题

  • 20 篇 path-following a...
  • 5 篇 secure communica...
  • 3 篇 power allocation
  • 3 篇 energy-efficient...
  • 3 篇 linear programmi...
  • 3 篇 interference net...
  • 2 篇 conical form
  • 2 篇 self-scaled cone
  • 2 篇 convex programmi...
  • 2 篇 potential-reduct...
  • 2 篇 self-scaled barr...
  • 2 篇 self-concordant ...
  • 2 篇 interior point a...
  • 2 篇 superlinear conv...
  • 2 篇 outage-aware bea...
  • 2 篇 unmanned aerial ...
  • 1 篇 information exch...
  • 1 篇 interfering netw...
  • 1 篇 energy efficienc...
  • 1 篇 p*-mappings

机构

  • 6 篇 princeton univ d...
  • 4 篇 queens univ belf...
  • 2 篇 cornell univ sch...
  • 2 篇 univ technol syd...
  • 2 篇 univ technol syd...
  • 1 篇 mit ctr operat r...
  • 1 篇 shanghai univ ke...
  • 1 篇 shanghai univ ke...
  • 1 篇 university of wi...
  • 1 篇 univ technol sch...
  • 1 篇 heriot watt univ...
  • 1 篇 res sch inform s...
  • 1 篇 univ washington ...
  • 1 篇 department of st...
  • 1 篇 univ sao paulo i...
  • 1 篇 res sch inform s...
  • 1 篇 king fahd univ p...
  • 1 篇 univ sao paulo a...
  • 1 篇 chinese acad sci...
  • 1 篇 heriot watt univ...

作者

  • 6 篇 sheng zhichao
  • 6 篇 poor h. vincent
  • 5 篇 duong trung q.
  • 4 篇 tuan hoang duong
  • 3 篇 todd mj
  • 2 篇 nesterov ye
  • 2 篇 nasir ali arshad
  • 2 篇 hoang duong tuan
  • 2 篇 silva natassya b...
  • 2 篇 branco kalinka r...
  • 1 篇 poor h. v.
  • 1 篇 xavier daniel m.
  • 1 篇 tuan h. d.
  • 1 篇 dutkiewicz eryk
  • 1 篇 ye yy
  • 1 篇 stephen j. wrigh...
  • 1 篇 sheng r
  • 1 篇 el shafie ahmed
  • 1 篇 faybusovich l
  • 1 篇 da costa daniel ...

语言

  • 19 篇 英文
  • 1 篇 其他
检索条件"主题词=Path-following algorithms"
20 条 记 录,以下是11-20 订阅
排序:
Power Allocation for Energy Efficiency and Secrecy of Wireless Interference Networks
收藏 引用
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 2018年 第6期17卷 3737-3751页
作者: Sheng, Zhichao Tuan, Hoang Duong Nasir, Ali Arshad Duong, Trung Q. Poor, H. Vincent Univ Technol Sydney Sch Elect & Data Engn Ultimo NSW 2007 Australia King Fahd Univ Petr & Minerals Dept Elect Engn Dhahran 31261 Saudi Arabia Queens Univ Belfast Belfast BT7 1NN Antrim North Ireland Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
Considering a multi-user interference network with an eavesdropper, this paper aims at the power allocation to optimize the worst secrecy throughput among the network links or the secure energy efficiency in terms of ... 详细信息
来源: 评论
SCHUR DECOMPOSITIONS OF A MATRIX AND THE BOUNDARY OF ITS PSEUDOSPECTRUM
收藏 引用
SIAM JOURNAL ON MATRIX ANALYSIS AND APPLICATIONS 2010年 第5期31卷 2921-2933页
作者: Boulton, Lyonell Lancaster, Peter Heriot Watt Univ Maxwell Inst Math Sci Edinburgh EH14 2AS Midlothian Scotland Heriot Watt Univ Dept Math Edinburgh EH14 2AS Midlothian Scotland Univ Calgary Dept Math & Stat Calgary AB T2N 1N4 Canada
We discuss the notion of irreducible block Schur decomposition of a complex square matrix and show how such a decomposition provides information about singularities in the boundaries of pseudospectra of the matrix. De... 详细信息
来源: 评论
Security and Energy Harvesting for MIMO-OFDM Networks
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 2020年 第4期68卷 2593-2606页
作者: Hoang, Tiep M. El Shafie, Ahmed da Costa, Daniel Benevides Duong, Trung Q. Tuan, Hoang Duong Marshall, Alan Queens Univ Belfast Sch Elect Elect Engn & Comp Sci Belfast BT7 1NN Antrim North Ireland Qualcomm Inc San Diego CA 92121 USA Fed Univ Ceara UFC Dept Comp Engn BR-62010560 Sobral Brazil Univ Technol Sydney Sch Elect & Data Engn Ultimo NSW 2007 Australia Univ Liverpool Dept Elect Engn & Elect Liverpool L69 3GJ Merseyside England
We consider a multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) network in which a source node, Alice, communicates with an energy-harvesting destination node, Bob, in the presenc... 详细信息
来源: 评论
Physical Layer Security Aided Wireless Interference Networks in the Presence of Strong Eavesdropper Channels
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2021年 16卷 3228-3240页
作者: Sheng, Zhichao Tuan, Hoang Duong Nasir, Ali Arshad Poor, H. Vincent Dutkiewicz, Eryk Shanghai Univ Key Lab Specialty Fiber Opt & Opt Access Networks Shanghai Inst Adv Commun & Data Sci Shanghai 200444 Peoples R China Univ Technol Sydney Sch Elect & Data Engn Sydney NSW 2007 Australia King Fahd Univ Petr & Minerals KFUPM Dept Elect Engn Dhahran 31261 Saudi Arabia Princeton Univ Dept Elect & Comp Engn Princeton NJ 08544 USA
Under both long (infinite) and short (finite) blocklength transmissions, this paper considers physical layer security for a wireless interference network of multiple transmitter-user pairs, which is overheard by multi... 详细信息
来源: 评论
Outage-Aware Secure Beamforming in MISO Wireless Interference Networks
收藏 引用
IEEE SIGNAL PROCESSING LETTERS 2018年 第7期25卷 956-960页
作者: Sheng, Zhichao Hoang Duong Tuan Duong, Trung Q. Poor, H. Vincent Univ Technol Sydney Sch Elect & Data Engn Broadway NSW 2007 Australia Queens Univ Belfast Belfast BT7 1NN Antrim North Ireland Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
Based on the knowledge of the channel distributions of a multi-input single-output wireless network of multiple transmitter-user pairs overheard by an eavesdropper, this letter develops an outage-aware beamforming des... 详细信息
来源: 评论
Primal-dual interior-point methods for self-scaled cones
收藏 引用
SIAM JOURNAL ON OPTIMIZATION 1998年 第2期8卷 324-364页
作者: Nesterov, YE Todd, MJ Univ Catholique Louvain CORE B-1348 Louvain Belgium Cornell Univ Sch Operat Res & Ind Engn Ithaca NY 14853 USA Univ Washington Dept Math Seattle WA 98195 USA MIT Ctr Operat Res Cambridge MA 02139 USA
In this paper we continue the development of a theoretical foundation for efficient primal-dual interior-point algorithms for convex programming problems expressed in conic form, when the cone and its associated barri... 详细信息
来源: 评论
ON ADAPTIVE-STEP PRIMAL-DUAL INTERIOR-POINT algorithms FOR LINEAR-PROGRAMMING
收藏 引用
MATHEMATICS OF OPERATIONS RESEARCH 1993年 第4期18卷 964-981页
作者: MIZUNO, S TODD, MJ YE, YY CORNELL UNIV SCH OPERAT RES & IND ENGNITHACANY 14853 UNIV IOWA DEPT MANAGEMENT SCIIOWA CITYIA 52242
We describe several adaptive-step primal-dual interior point algorithms for linear programming. All have polynomial time complexity while some allow very long steps in favorable circumstances. We provide heuristic rea... 详细信息
来源: 评论
Secrecy Throughput of Wireless Interference Networks with Uncertain Channel State Information
Secrecy Throughput of Wireless Interference Networks with Un...
收藏 引用
36th IEEE Global Communications Conference (GLOBECOM)
作者: Sheng, Z. Tuan, H. D. Nasir, A. A. Poor, H. V. Univ Technol Fac Engn & Informat Technol Sydney NSW Australia KFUPM Dept Elect Engn Dhahran Saudi Arabia Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
Considering a multi-user interference network with an eavesdropper, this paper investigates the problem of power allocation to optimize the worst secrecy throughput among the network links. Three scenarios for the acc... 详细信息
来源: 评论
PLS for Wireless Interference Networks in the Short Blocklength Regime with Strong Wiretap Channels
PLS for Wireless Interference Networks in the Short Blocklen...
收藏 引用
IEEE Global Communications Conference (GLOBECOM) on Advanced Technology for 5G Plus
作者: Sheng, Zhichao Tuan, Hoang D. Nasir, Ali A. Poor, H. Vincent Shanghai Univ Key Lab Specialty Fiber Opt & Opt Access Networks Joint Int Res Lab Specialty Fiber Opt & Adv Commu Shanghai Peoples R China Univ Technol Sch Elect & Data Engn Sydney NSW 2007 Australia King Fahd Univ Petr & Minerals KFUPM Dept Elect Engn Dhahran Saudi Arabia Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
This paper considers a wireless interference network in which the communication between multiple transmitter-user pairs is overheard by multiple eavesdroppers (EVs). Based on knowledge of the channel distribution, the... 详细信息
来源: 评论
Primal-Dual Interior-Point Methods
收藏 引用
丛书名: Other Titles in Applied Mathematics
1997年
作者: Stephen J. Wright
In the past decade, primal-dual algorithms have emerged as the most important and useful algorithms from the interior-point class. This book presents the major primal-dual algorithms for linear programming in straight... 详细信息
来源: 评论