LTE Security potential vulnerability and algorithm enhancements.
Gautam SiwachAmir EsmailpourPublished in: CCECE (2014)
Keyphrases
- learning algorithm
- computational complexity
- cost function
- optimization algorithm
- times faster
- significant improvement
- computational cost
- preprocessing
- k means
- np hard
- experimental evaluation
- worst case
- high accuracy
- detection algorithm
- theoretical analysis
- matching algorithm
- objective function
- recognition algorithm
- expectation maximization
- linear programming
- mobile devices
- optimal solution
- bit rate
- segmentation algorithm
- input data
- search space
- convergence rate
- video streaming