咨询与建议

限定检索结果

文献类型

  • 39 篇 期刊文献
  • 14 篇 会议

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 46 篇 电气工程
    • 39 篇 计算机科学与技术...
    • 16 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 20 篇 理学
    • 19 篇 数学
    • 1 篇 物理学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 53 篇 function computa...
  • 10 篇 network coding
  • 7 篇 communication co...
  • 5 篇 capacity
  • 5 篇 distributed sour...
  • 5 篇 sensor networks
  • 4 篇 public discussio...
  • 4 篇 recoverability
  • 3 篇 information theo...
  • 3 篇 privacy constrai...
  • 3 篇 interactive codi...
  • 3 篇 source observati...
  • 3 篇 privacy
  • 2 篇 source coding wi...
  • 2 篇 data privacy
  • 2 篇 achievable compu...
  • 2 篇 linear network c...
  • 2 篇 hierarchical net...
  • 2 篇 chernoff radius
  • 2 篇 cut-set bound

机构

  • 6 篇 univ maryland de...
  • 5 篇 univ calif san d...
  • 3 篇 indian inst tech...
  • 3 篇 univ maryland sy...
  • 3 篇 iowa state univ ...
  • 3 篇 natl sun yat sen...
  • 3 篇 boston univ dept...
  • 3 篇 univ sci & techn...
  • 3 篇 univ calif davis...
  • 3 篇 ecole polytech f...
  • 3 篇 univ maryland in...
  • 2 篇 alcatel lucent b...
  • 2 篇 indian inst sci ...
  • 2 篇 univ calif berke...
  • 2 篇 univ calif berke...
  • 2 篇 ibm res almaden ...
  • 1 篇 dept. of electr....
  • 1 篇 alexander techno...
  • 1 篇 univ carlos iii ...
  • 1 篇 univ illinois de...

作者

  • 5 篇 narayan prakash
  • 5 篇 gastpar michael
  • 5 篇 franceschetti ma...
  • 4 篇 appuswamy rathin...
  • 4 篇 karamchandani ni...
  • 4 篇 lim sung hoon
  • 4 篇 nageswaran ajayk...
  • 3 篇 kowshik hemant
  • 3 篇 lai lifeng
  • 3 篇 tyagi himanshu
  • 3 篇 ishwar prakash
  • 3 篇 wang chien-yi
  • 3 篇 wei guo
  • 3 篇 chen li
  • 3 篇 ma nan
  • 3 篇 tu wenwen
  • 3 篇 dey bikash kumar
  • 3 篇 kumar p. r.
  • 3 篇 hsiao shen-fu
  • 3 篇 ramamoorthy adit...

语言

  • 53 篇 英文
检索条件"主题词=function computation"
53 条 记 录,以下是41-50 订阅
排序:
Lossy Computing of Correlated Sources with Fractional Sampling
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 2013年 第9期61卷 3685-3696页
作者: Liu, Xi Simeone, Osvaldo Erkip, Elza Broadcom Matawan NJ 07747 USA New Jersey Inst Technol ECE Dept Newark NJ 07102 USA NYU Polytech Inst ECE Dept Brooklyn NY 11201 USA
This paper considers the problem of lossy compression for the computation of a function of two correlated sources, both of which are observed at the encoder. Due to presence of observation costs, the encoder is allowe... 详细信息
来源: 评论
The Infinite-Message Limit of Two-Terminal Interactive Source Coding
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2013年 第7期59卷 4071-4094页
作者: Ma, Nan Ishwar, Prakash Univ Calif Berkeley Dept Elect Engn & Comp Sci Berkeley CA 94709 USA Boston Univ Dept Elect & Comp Engn Boston MA 02215 USA
A two-terminal interactive function computation problem with alternating messages is studied within the framework of distributed block source coding theory. For any finite number of messages, a single-letter character... 详细信息
来源: 评论
Linear Codes, Target function Classes, and Network Computing Capacity
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2013年 第9期59卷 5741-5753页
作者: Appuswamy, Rathinakumar Franceschetti, Massimo Karamchandani, Nikhil Zeger, Kenneth IBM Res Almaden San Jose CA 95120 USA Univ Calif San Diego Dept Elect & Comp Engn La Jolla CA 92093 USA Univ Calif Los Angeles Dept Elect Engn Los Angeles CA 90095 USA
We study the use of linear codes for network computing in single-receiver networks with various classes of target functions of the source messages. Such classes include reducible, semi-injective, and linear target fun... 详细信息
来源: 评论
Optimal computation of Symmetric Boolean functions in Collocated Networks
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 2013年 第4期31卷 639-654页
作者: Kowshik, Hemant Kumar, P. R. Amazon Dev Ctr Advertising Optimizat Grp Bangalore Karnataka India Texas A&M Univ Dept Elect & Comp Engn College Stn TX USA
We consider collocated wireless sensor networks, where each node's transmissions can be heard by every other node. Each node has a Boolean measurement and the goal of the network is to compute a given Boolean func... 详细信息
来源: 评论
Communicating the Sum of Sources Over a Network
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 2013年 第4期31卷 655-665页
作者: Ramamoorthy, Aditya Langberg, Michael Iowa State Univ Dept Elect & Comp Engn Ames IA 50011 USA Open Univ Israel Div Comp Sci IL-43107 Raanana Israel
We consider the network communication scenario, over directed acyclic networks with unit capacity edges in which a number of sources s(i) each holding independent unit-entropy information X-i wish to communicate the s... 详细信息
来源: 评论
On Network Coding for Sum-Networks
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2012年 第1期58卷 50-63页
作者: Rai, Brijesh Kumar Dey, Bikash Kumar Indian Inst Technol Dept Elect Engn Bombay Maharashtra India
A directed acyclic network is considered where all the terminals need to recover the sum of the symbols generated at all the sources. We call such a network a sum-network. It is shown that there exists a solvably (and... 详细信息
来源: 评论
Distributed symmetric function computation in noisy wireless sensor networks
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2007年 第12期53卷 4826-4833页
作者: Ying, Lei Srikant, R. Dullerud, Geir E. Univ Illinois Dept Elect & Comp Engn Coordinated Sci Lab Urbana IL 61801 USA Univ Illinois Dept Mech & Ind Engn Coordinated Sci Lab Urbana IL 61801 USA
In this correspondence, we consider a wireless sensor network consisting of n sensors, and each sensor has a measurement, which is an integer value belonging to the set {0,..., m - 1}, so that it can be represented by... 详细信息
来源: 评论
Network Coding for Computing: Cut-Set Bounds
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2011年 第2期57卷 1015-1030页
作者: Appuswamy, Rathinakumar Franceschetti, Massimo Karamchandani, Nikhil Zeger, Kenneth Univ Calif San Diego Dept Elect & Comp Engn La Jolla CA 92093 USA
The following network computing problem is considered. Source nodes in a directed acyclic network generate independent messages and a single receiver node computes a target function of the messages. The objective is t... 详细信息
来源: 评论
When Is a function Securely Computable?
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2011年 第10期57卷 6337-6350页
作者: Tyagi, Himanshu Narayan, Prakash Gupta, Piyush Univ Maryland Dept Elect & Comp Engn College Pk MD 20742 USA Univ Maryland Syst Res Inst College Pk MD 20742 USA Alcatel Lucent Bell Labs Murray Hill NJ 07974 USA
A subset of a set of terminals that observe correlated signals seek to compute a function of the signals using public communication. It is required that the value of the function be concealed from an eavesdropper with... 详细信息
来源: 评论
In-Network computation in Random Wireless Networks: A PAC Approach to Constant Refresh Rates with Lower Energy Costs
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2011年 第1期10卷 146-155页
作者: Iyer, Srikanth K. Manjunath, D. Sundaresan, Rajesh Indian Inst Sci Dept Math Bangalore 560012 Karnataka India Indian Inst Technol Dept Elect Engn Bombay 400076 Maharashtra India Indian Inst Sci Dept Elect Commun Engn Bangalore 560012 Karnataka India
We propose a method to compute a probably approximately correct (PAC) normalized histogram of observations with a refresh rate of Theta(1) time units per histogram sample on a random geometric graph with noise-free li... 详细信息
来源: 评论