Sciweavers

189 search results - page 30 / 38
» An optimal generalization of the centerpoint theorem, and it...
Sort
View
ISPD
1997
ACM
186views Hardware» more  ISPD 1997»
14 years 2 days ago
EWA: exact wiring-sizing algorithm
The wire sizing problem under inequality Elmore delay constraints is known to be posynomial, hence convex under an exponential variable-transformation. There are formal methods fo...
Rony Kay, Gennady Bucheuv, Lawrence T. Pileggi
MEDIAFORENSICS
2010
13 years 9 months ago
Minimizing embedding impact in steganography using trellis-coded quantization
In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance...
Tomás Filler, Jan Judas, Jessica J. Fridric...
SIGECOM
2008
ACM
126views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Behavioral experiments in networked trade
We report on an extensive series of highly controlled human subject experiments in networked trade. Our point of departure is a simple and well-studied bipartite network exchange ...
J. Stephen Judd, Michael Kearns
JMM2
2007
123views more  JMM2 2007»
13 years 7 months ago
An Assignment Scheme to Control Multiple Pan/Tilt Cameras for 3D Video
— This paper presents an assignment scheme to control multiple Pan/Tilt (PT) cameras for 3D video of a moving object. The system combines static wide field of view (FOV) cameras...
Sofiane Yous, Norimichi Ukita, Masatsugu Kidode
SIGMOD
2010
ACM
262views Database» more  SIGMOD 2010»
14 years 21 days ago
K-nearest neighbor search for fuzzy objects
The K-Nearest Neighbor search (kNN) problem has been investigated extensively in the past due to its broad range of applications. In this paper we study this problem in the contex...
Kai Zheng, Gabriel Pui Cheong Fung, Xiaofang Zhou