咨询与建议

限定检索结果

文献类型

  • 39 篇 期刊文献
  • 14 篇 会议

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 46 篇 电气工程
    • 39 篇 计算机科学与技术...
    • 16 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 20 篇 理学
    • 19 篇 数学
    • 1 篇 物理学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 53 篇 function computa...
  • 10 篇 network coding
  • 7 篇 communication co...
  • 5 篇 capacity
  • 5 篇 distributed sour...
  • 5 篇 sensor networks
  • 4 篇 public discussio...
  • 4 篇 recoverability
  • 3 篇 information theo...
  • 3 篇 privacy constrai...
  • 3 篇 interactive codi...
  • 3 篇 source observati...
  • 3 篇 privacy
  • 2 篇 source coding wi...
  • 2 篇 data privacy
  • 2 篇 achievable compu...
  • 2 篇 linear network c...
  • 2 篇 hierarchical net...
  • 2 篇 chernoff radius
  • 2 篇 cut-set bound

机构

  • 6 篇 univ maryland de...
  • 5 篇 univ calif san d...
  • 3 篇 indian inst tech...
  • 3 篇 univ maryland sy...
  • 3 篇 iowa state univ ...
  • 3 篇 natl sun yat sen...
  • 3 篇 boston univ dept...
  • 3 篇 univ sci & techn...
  • 3 篇 univ calif davis...
  • 3 篇 ecole polytech f...
  • 3 篇 univ maryland in...
  • 2 篇 alcatel lucent b...
  • 2 篇 indian inst sci ...
  • 2 篇 univ calif berke...
  • 2 篇 univ calif berke...
  • 2 篇 ibm res almaden ...
  • 1 篇 dept. of electr....
  • 1 篇 alexander techno...
  • 1 篇 univ carlos iii ...
  • 1 篇 univ illinois de...

作者

  • 5 篇 narayan prakash
  • 5 篇 gastpar michael
  • 5 篇 franceschetti ma...
  • 4 篇 appuswamy rathin...
  • 4 篇 karamchandani ni...
  • 4 篇 lim sung hoon
  • 4 篇 nageswaran ajayk...
  • 3 篇 kowshik hemant
  • 3 篇 lai lifeng
  • 3 篇 tyagi himanshu
  • 3 篇 ishwar prakash
  • 3 篇 wang chien-yi
  • 3 篇 wei guo
  • 3 篇 chen li
  • 3 篇 ma nan
  • 3 篇 tu wenwen
  • 3 篇 dey bikash kumar
  • 3 篇 kumar p. r.
  • 3 篇 hsiao shen-fu
  • 3 篇 ramamoorthy adit...

语言

  • 53 篇 英文
检索条件"主题词=function computation"
53 条 记 录,以下是1-10 订阅
function computation Through a Bidirectional Relay
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2019年 第2期65卷 902-916页
作者: Ravi, Jithin Dey, Bikash Kumar Indian Inst Technol Dept Elect Engn Mumbai 400076 Maharashtra India Univ Carlos III Madrid Signal Theory & Commun Dept Leganes 28911 Spain
We consider a function computation problem in a three-node wireless network. Nodes A and B observe two correlated sources X and Y, respectively, and want to compute a function f (X, Y). To achieve this, nodes A and B ... 详细信息
来源: 评论
Multi-Layer function computation in Disorganized Wireless Networks
Multi-Layer Function Computation in Disorganized Wireless Ne...
收藏 引用
IEEE Wireless Communications and Networking Conference (IEEE WCNC)
作者: Wu, Fangzhou Chen, Li Wei, Guo Univ Sci & Technol China Dept Elect Engn & Informat Sci Hefei Peoples R China
For future wireless networks, enormous numbers of interconnections are required, creating a disorganized topology and leading to a great challenge in data aggregation. Instead of collecting data individually, a more e... 详细信息
来源: 评论
On function computation With Privacy and Secrecy Constraints
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2019年 第10期65卷 6716-6733页
作者: Tu, Wenwen Lai, Lifeng Black Sesame Technol Inc Santa Clara CA 95050 USA Univ Calif Davis Dept Elect & Comp Engn Davis CA 95616 USA
In this paper, the problem of function computation with privacy and secrecy constraints is considered. The considered model consists of three legitimate nodes (i.e., two transmitters, Alice and Bob, and a fusion cente... 详细信息
来源: 评论
Adaptive Analog function computation via Fading Multiple-Access Channels
收藏 引用
IEEE COMMUNICATIONS LETTERS 2018年 第1期22卷 213-216页
作者: Jeon, Sang-Woon Jung, Bang Chul Hanyang Univ Dept Mil Informat Engn Ansan 15588 South Korea Chungnam Natl Univ Dept Elect Engn Daejeon 34134 South Korea
In this letter, we propose an adaptive analog function computation (AFC) via fading multiple-access channels in which multiple sensors simultaneously send their observations and then the fusion center computes the des... 详细信息
来源: 评论
A Uniform-Forcing Transceiver Design for Over-the-Air function computation
收藏 引用
IEEE WIRELESS COMMUNICATIONS LETTERS 2018年 第6期7卷 942-945页
作者: Chen, Li Qin, Xiaowei Wei, Guo Univ Sci & Technol China Dept Elect Engn & Informat Sci Hefei 230027 Anhui Peoples R China
The future Internet-of-Things network is expected to connect billions of sensors, which incurs high latency for data aggregation. To overcome this challenge, a new technique called over-the-air function computation wa... 详细信息
来源: 评论
Optimization of Lookup Table Size in Table-Bound Design of function computation
Optimization of Lookup Table Size in Table-Bound Design of F...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Hsiao, Shen-Fu Chen, Kun-Chih Chen, Yi-Hau Natl Sun Yat Sen Univ Dept Comp Sci & Engn Kaohsiung Taiwan Realtek Semicond Corp Hsinchu Taiwan
computation of function values is critical for designing datapath units in digital signal processors (DSP) and graphics processing units (GPU). Most function computation methods requires lookup tables (LUT) and simple... 详细信息
来源: 评论
On Private Lossy function computation  19
On Private Lossy Function Computation
收藏 引用
IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
作者: Tu, Wenwen Lai, Lifeng Univ Calif Davis Dept Elect & Comp Engn Davis CA 95616 USA
In this paper, the problem of lossy function computation with secrecy and privacy constraints is considered. The considered model consists of two legitimate terminals Alice and Bob, and an eavesdropper Eve. Under a ce... 详细信息
来源: 评论
Architectural Exploration of function computation Based on Cubic Polynomial Interpolation with Application in Deep Neural Networks  21
Architectural Exploration of Function Computation Based on C...
收藏 引用
21st Euromicro Conference on Digital System Design (DSD)
作者: Hsiao, Shen-Fu Chen, Yu-Chang Liang, Hsiang-Hao Natl Sun Yat Sen Univ Dept Comp Sci & Engn Kaohsiung Taiwan Synopsys Taiwan Co Hsinchu Taiwan
computation of function values is widely used in applications of computer vision, communication, and artificial neural networks. Piecewise polynomial approximation (PPA) with lookup tables (LUT) assisted by arithmetic... 详细信息
来源: 评论
function computation with Privacy Constraints  51
Function Computation with Privacy Constraints
收藏 引用
51st IEEE Asilomar Conference on Signals, Systems, and Computers
作者: Tu, Wenwen Lai, Lifeng Univ Calif Davis Dept Elect & Comp Engn Davis CA 95616 USA
In this manuscript, the problem of function computation with privacy constraints is considered. The problem consists of two legitimate nodes Alice and Bob, and an eavesdropper Eve. Bob would like to compute a function... 详细信息
来源: 评论
function computation with Privacy Constraints
Function Computation with Privacy Constraints
收藏 引用
Asilomar Conference on Signals, Systems, and Computers
作者: Wenwen Tu Lifeng Lai Department of Electrical and Computer Engineering University of California Davis CA
In this manuscript, the problem of function computation with privacy constraints is considered. The problem consists of two legitimate nodes Alice and Bob, and an eaves-dropper Eve. Bob would like to compute a functio... 详细信息
来源: 评论