Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
Now showing items 1019-1038 of 1262
-
Robust Non-convex Penalties for Solving Sparse Linear Inverse Problems and Applications to Computational Imaging
Sparse linear inverse problems require the solution to the l-0-regularized least-squares cost, which is not computationally tractable. Approximate and computationally tractable solutions are obtained by employing ... -
Robust Nonparametric Sequential Distributed Spectrum Sensing under EMI and Fading
(2018-07-16)Opportunistic use of unused spectrum could efficiently be carried out using the paradigm of Cognitive Radio (CR). A spectrum remains idle when the primary user (licensee) is not using it. The secondary nodes detect this ... -
Robust Precoder And Transceiver Optimization In Multiuser Multi-Antenna Systems
(2013-10-04)The research reported in this thesis is concerned with robust precoder and transceiver optimization in multiuser multi-antenna wireless communication systems in the presence of imperfect channel state information(CSI). ... -
Robust Risk Minimization under Label Noise
In the setting of supervised learning, one learns a classi fier from training data consisting of patterns and the corresponding labels. When labels of the examples in training data have errors, it is referred to as label ... -
Robust Techniques Of Language Modeling For Spoken Language Identification
(2009-07-23)Language Identification (LID) is the task of automatically identifying the language of speech signal uttered by an unknown speaker. An N language LID task is to classify an input speech utterance, spoken by an unknown ... -
Role of Channel State Information in Adaptation in Current and Next Generation Wireless Systems
(2017-11-24)Motivated by the increasing demand for higher data rates, coverage, and spectral efficiency, current and next generation wireless systems adapt transmission parameters and even who is being transmitted to, based on the ... -
Role of Nonlocality and Counterfactuality in Quantum Cryptography
(2018-01-09)Quantum cryptography is arguably the most successfully applied area of quantum information theory. In this work, We invsetigate the role of quantum indistinguishability in random number generation, quantum temporal ... -
Role of Power Control in Enhancing the Performance of Opportunistic Selection Schemes
Opportunistic selection reaps the benefits of multiuser diversity in many wireless applications. For example, it increases throughput of cellular networks, lifetime of wireless sensor networks, and improves diversity in ... -
Safe Operating Area Reliability of AlGaN/GaN High Electron Mobility Transistors (HEMTs)
Gallium Nitride (GaN) based high electron mobility transistors (HEMTs) are extensively considered for power switching and RF applications by the virtue of their unique properties. However, despite of its attractive ... -
Sampling of Structured Signals: Techniques and Imaging Applications
The celebrated Shannon sampling theorem is a key mathematical tool that allows one to seamlessly switch between the continuous-time and discrete-time representations of bandlimited signals. Sampling and reconstruction of ... -
Savitzky-Golay Filters and Application to Image and Signal Denoising
(2018-07-18)We explore the applicability of local polynomial approximation of signals for noise suppression. In the context of data regression, Savitzky and Golay showed that least-squares approximation of data with a polynomial of ... -
Scalable Low Power Issue Queue And Store Queue Design For Superscalar Processors
(2009-03-09)A Large instruction window is a key requirement to exploit greater Instruction Level Parallelism in out-of-order superscalar processors. Along with the instruction window size, the size of various other structures including ... -
Scalable Sprase Bayesian Nonparametric and Matrix Tri-factorization Models for Text Mining Applications
(2018-05-23)Hierarchical Bayesian Models and Matrix factorization methods provide an unsupervised way to learn latent components of data from the grouped or sequence data. For example, in document data, latent component corn-responds ... -
Scaling Blockchains Using Coding Theory and Verifiable Computing
The issue of scalability has been restricting blockchain from its widespread adoption. The current transaction rate of bitcoin is around seven transactions/second while its size has crossed the 300 GB mark. Although many ... -
Scaling Context-Sensitive Points-To Analysis
(2014-05-06)Pointer analysis is one of the key static analyses during compilation. The efficiency of several compiler optimizations and transformations depends directly on the scalability and precision of the underlying pointer analysis. ... -
Scheduling Algorithms for Wireless Networks and Cloud Computing Platforms
This thesis focuses on designing scheduling algorithms for wireless communication networks, FMCW radar networks, and cloud computing platforms. In each case, the algorithms aim at efficient utilization of resources, e.g., ... -
Scheduling For Stable And Reliable Communication Over Multiaccess Channels And Degraded Broadcast Channels
(2008-09-26)Information-theoretic arguments focus on modeling the reliability of information transmission, assuming availability of infinite data at sources, thus ignoring randomness in message generation times at the respective ... -
Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects
(2018-07-04)This dissertation is primarily concerned with the communication required to achieve secret key (SK) capacity in a multiterminal source model. The multiterminal source model introduced by Csiszár and Narayan consists of a ... -
Secure Computation Protocol Suite for Privacy-Conscious Applications
As an alternative to performing analytics in the clear, there is an increasing demand for developing privacy-preserving solutions that aim to protect sensitive data while still allowing for its efficient analysis. Among ...