Sciweavers

2001 search results - page 363 / 401
» An Update on Generalized Information Theory
Sort
View
CASES
2004
ACM
14 years 1 months ago
A hamming distance based VLIW/EPIC code compression technique
This paper presents and reports on a VLIW code compression technique based on vector Hamming distances [19]. It investigates the appropriate selection of dictionary vectors such t...
Montserrat Ros, Peter Sutton
MM
2004
ACM
154views Multimedia» more  MM 2004»
14 years 1 months ago
Bio-Fi: inverse biotelemetry projects
Bio-Fi is a collection of art projects undertaken by S.W.A.M.P. (Studies of Work Atmospheres and Mass Production), collaborative art projects by Douglas Easterly and Matt Kenyon. ...
Douglas Easterly
AMEC
2004
Springer
14 years 1 months ago
A Budget-Balanced, Incentive-Compatible Scheme for Social Choice
Abstract. Many practical scenarios involve solving a social choice problem: a group of self-interested agents have to agree on an outcome that best fits their combined preferences...
Boi Faltings
WPES
2003
ACM
14 years 28 days ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
CIKM
2003
Springer
14 years 28 days ago
High dimensional reverse nearest neighbor queries
Reverse Nearest Neighbor (RNN) queries are of particular interest in a wide range of applications such as decision support systems, profile based marketing, data streaming, docum...
Amit Singh, Hakan Ferhatosmanoglu, Ali Saman Tosun