Filters








68,226 Hits in 3.0 sec

Approximation Schemes for Multi-Budgeted Independence Systems [chapter]

Fabrizio Grandoni, Rico Zenklusen
2010 Lecture Notes in Computer Science  
This gives a deterministic approximation scheme for k-budgeted matroid independent set; iii) we present a deterministic approximation scheme for 2-budgeted matching.  ...  For two or more budgets, typically only multi-criteria approximation schemes are available, which return slightly infeasible solutions.  ...  However, often multi-criteria approximation schemes are known, which provide a (1 − ε)-approximate solution violating the budgets by a factor (1 + ε).  ... 
doi:10.1007/978-3-642-15775-2_46 fatcat:fcokbd7vkbhwviu7fs7stnodmy

Joint Power Optimization for Multi-Source Multi-Destination Relay Networks

Fuyu Chen, Weifeng Su, Stella Batalama, John D. Matyjas
2011 IEEE Transactions on Signal Processing  
In this paper, low-complexity joint power assignment algorithms are developed for multi-source multi-destination relay networks where multiple sources share a common relay that forwards all received signals  ...  The proposed optimization schemes are scalable and lead to power assignment algorithms that exhibit the same optimization complexity for any number (K) of source-destination pairs in the network.  ...  Thus, we have (26) We note that for moderate or high SINR, we may approximate and . So, from (26) we may approximate as follows: The above approximation is asymptotically tight for high SINR.  ... 
doi:10.1109/tsp.2011.2109958 fatcat:citqi7kedzdaln32hmgiluv2gq

New approaches to multi-objective optimization

Fabrizio Grandoni, R. Ravi, Mohit Singh, Rico Zenklusen
2013 Mathematical programming  
Still, for most of these problems efficient deterministic and randomized approximation schemes are known.  ...  We present a simple mechanism to transform multicriteria approximation schemes into pure approximation schemes for problems whose A preliminary version of many results in this paper appeared in ESA'09  ...  Acknowledgments We are grateful to Christian Reitwießner and Maximilian Witek for pointing us to the paper of Stromquist and Woodall [42] .  ... 
doi:10.1007/s10107-013-0703-7 fatcat:7cybe3umufbkzpygtj5baruyvi

Optimization with More than One Budget [article]

Fabrizio Grandoni, Rico Zenklusen
2010 arXiv   pre-print
This gives a deterministic approximation scheme for k-budgeted matroid independent set. 3. We present a deterministic approximation scheme for 2-budgeted matching.  ...  For the remaining problems, whose set of solutions forms an independence system, we present deterministic and randomized polynomial-time approximation schemes for a constant number k of budget constraints  ...  The authors wish to thank Friedrich Eisenbrand for supporting their visit to EPFL and for helpful discussions.  ... 
arXiv:1002.2147v1 fatcat:dk3kaiddc5cnnh7s6kkxnb4wfe

Early Detection for Optimal-Latency Communications in Multi-Hop Links

Diego Barragan Guerrero, Minh Au, Ghyslain Gagnon, Francois Gagnon, Pascal Giard
2019 2019 16th International Symposium on Wireless Communication Systems (ISWCS)  
Furthermore, in multi-hop low-traffic or continuous-transmission links, we show that our scheme can reliably detect symbols before the end of their transmission, significantly reducing the latency, while  ...  In this paper, we propose an early-detection scheme for wireless communications under a finite-blocklength regime that employs a sequential-test technique to reduce latency while maintaining reliability  ...  The above proves that early-detection schemes can reduce latency in multi-hop systems using DF relaying schemes. V.  ... 
doi:10.1109/iswcs.2019.8877294 dblp:conf/iswcs/GuerreroAGGG19 fatcat:mijumjugi5dnjip3uvnnrp2c6i

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Weiming Shi, Bo Hong
2010 2010 IEEE Second International Conference on Cloud Computing Technology and Science  
We identify two modes of the system: budget-bound and communication-bound  The allocation scheme should be benefit-aware.  ...  steady-state throughput maximization problem is a reasonable approximation of the budget-constrained makespan minimization problem  ...   Yet, we provide an analytical framework and highlight an important metric that needs to be incorporated into the resource allocation scheme for the benefit of the cloud users.  ... 
doi:10.1109/cloudcom.2010.54 dblp:conf/cloudcom/ShiH10 fatcat:ov5v32hrb5gk3ouoihlz7uhx2u

UTILITY THEORY VIOLATIONS BY MULTI-CRITERIA HIERARCHICAL WEIGHTING METHODS

JAY R. LUND
1994 Civil Engineering Systems  
This paper discusses two violations of utility theory that can arise with some common multi-criteria hierarchical weighting methods when employed for selection of the best of several alternatives considering  ...  First, these hierarchical weighting methods are found to violate utility theory's principle of independence of irrelevant alternatives. Proof of this violation is made by counter-example.  ...  Anex are thanked for their comments on an earlier version of this paper.  ... 
doi:10.1080/02630259408970146 fatcat:hozg3ofqqray7k6qax34jzg3mu

DPCrowd: Privacy-preserving and Communication-efficient Decentralized Statistical Estimation for Real-time Crowd-sourced Data

Xuebin Ren, Chia-Mu Yu, Wei Yu, Xinyu Yang, Jun Zhao, Shusen Yang
2020 IEEE Internet of Things Journal  
For mitigating the privacy concern, while traditional differential privacy (DP) mechanism can be simply implemented to perturb the statistics in each timestamp and independently for each dimension, this  ...  providing more reliable knowledge for our society.  ...  For various ε, the ARE of independent estimation scheme RescueDP is the largest due to no communications among distributed servers.  ... 
doi:10.1109/jiot.2020.3020089 fatcat:qwycqcrhkjai3gk2tnnndkznzy

Cache Size Allocation in Backhaul Limited Wireless Networks [article]

Xi Peng and Jun Zhang and S.H. Song and Khaled B. Letaief
2016 arXiv   pre-print
More specifically, for a highly concentrated file popularity distribution, the required cache size is independent of the total number of files, while for a less concentrated file popularity distribution  ...  Furthermore, we study the multi-cell scenario, and provide a bisection search algorithm to find the optimal cache size allocation.  ...  Cache Size Allocation for Different Cache Budget In this subsection, we will demonstrate the cache size allocation scheme under a specific multi-cell scenario consisting of six cells with backhaul capacities  ... 
arXiv:1602.08728v1 fatcat:rgeqbb6kkfg63figaerbljg5ia

Multi User Diversity Evaluation in MIMO HSDPA Downlink Channels

G.Vamshi Krishna, Ch. Suresh Kumar, U. Kiran, K. Rajesh Reddy
2012 International Journal of Communication Networks and Security  
Acquiring feedback from many users allows multi-user diversity to be exploited, while highrate feedback allows for very precise selection of beamforming directions.  ...  It is shown that systems in which a limited number of users feedback high-rate channel information significantly outperform low-rate/many user systems.  ...  SYSTEM MODEL We consider a multi-input multi-output (MIMO) Gaussian broadcast channel Where N transmitting antennas at the transmitter (the BS or transmitter) and K single antenna users.  ... 
doi:10.47893/ijcns.2012.1031 fatcat:vws65vgkpjel3kncwfh7khpcou

Multi-channel Opus compression for far-field automatic speech recognition with a fixed bitrate budget [article]

Lukas Drude, Jahn Heymann, Andreas Schwarz, Jean-Marc Valin
2021 arXiv   pre-print
We demonstrate that our approach can lead to a 37.5 % bitrate reduction or a 5.1 % relative word error rate reduction for a fixed bitrate budget in a seven channel setup.  ...  In this publication, we propose an improved approach for the compression of microphone array signals based on Opus, using a modified joint channel coding approach and additionally introducing a multi-channel  ...  multi-channel coding scheme.  ... 
arXiv:2106.07994v1 fatcat:cxb3j5lrzfdizm4x7wlfkwjao4

Distributed Coding of Spherical Images with Jointly Refined Decoding

Tammam Tillo, Barbara Penna, Pascal Frossard, Pierre Vandergheynst
2005 2005 IEEE 7th Workshop on Multimedia Signal Processing  
It is finally shown that, even in the absence of any information about the scene or the position of the cameras, the proposed scheme offers improved performance with respect to an independent encoding  ...  Spherical images allow for avoiding distortion due to the common euclidian assumption in the representation of the plenoptic function.  ...  The authors would like to thank Ivana Tosic, from the Signal Processing Institute at EPFL, for providing the images used in the experiments.  ... 
doi:10.1109/mmsp.2005.248618 dblp:conf/mmsp/TilloPFV05 fatcat:i5itrkkqcre4npwff276ylhuny

Primary care budget holding in the United Kingdom National Health Service: learning from a decade of health service reform

David Wilkin
2002 Medical Journal of Australia  
Half of all general practitioners had joined the GP fundholding scheme by 1997, and many others had joined broader GP commissioning groups, but fundholders controlled only about 20% of the budget for hospital  ...  The United Kingdom National Health Service (NHS) has experienced 10 years of primary care budget holding in a variety of forms. 2.  ...  ■ Standard fundholding practices responsible for approximately 20% of HCHS budget, commissioning elective procedures and community nursing.  ... 
pmid:12064986 fatcat:tspvbjcfafblpd62sejawy4ci4

An Overview of Massive MIMO Technology Components in METIS

Gabor Fodor, Nandana Rajatheva, Wolfgang Zirwas, Lars Thiele, Martin Kurras, Kaifeng Guo, Antti Tolli, Jesper H. Sorensen, Elisabeth de Carvalho
2017 IEEE Communications Magazine  
state information for sparse channels in frequency division duplexing systems, managing user grouping and multi-user beamforming, and a decentralized coordinated transceiver design.  ...  of very large arrays as an enabler technology for meeting the requirements of 5 th generation systems.  ...  For multi-cell multi-user massive MIMO systems, we propose low complexity transceiver designs that well approximate the performance of centrally coordinated schemes.  ... 
doi:10.1109/mcom.2017.1600802 fatcat:5rq2s6repzauznp2lgui2ezizi

Robust Power Allocation and Outage Analysis for Secrecy in Independent Parallel Gaussian Channels

Siddhartha Sarma, Kundan Kandhway, Joy Kuri
2016 IEEE Wireless Communications Letters  
We find the proposed scheme effective for uncertain eavesdropper CSI in comparison with conventional power allocation schemes.  ...  Firstly, we evaluate the probability of zero secrecy rate in this system for (i) given instantaneous channel conditions and (ii) a Rayleigh fading scenario.  ...  Researchers have studied and characterized secrecy capacity for different communication systems and channel scenarios ranging from single antenna single hop [1] to multi-antenna multi-hop systems [2  ... 
doi:10.1109/lwc.2015.2497347 fatcat:3bphzp367nfm7hnneky3lck5xe
« Previous Showing results 1 — 15 out of 68,226 results