Sciweavers

3991 search results - page 714 / 799
» Bounding homogeneous models
Sort
View
PIMRC
2010
IEEE
13 years 5 months ago
Downlink capacity of two-tier cognitive femto networks
Abstract--In two-tier networks consisting of a macrocell overlaid with femtocells in co-channel deployment and closed-access policy, spatial reuse is achieved at the price of sever...
Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen
TACAS
2010
Springer
212views Algorithms» more  TACAS 2010»
13 years 5 months ago
Assume-Guarantee Verification for Probabilistic Systems
Abstract. We present a compositional verification technique for systems that exhibit both probabilistic and nondeterministic behaviour. We adopt an assume-guarantee approach to ver...
Marta Z. Kwiatkowska, Gethin Norman, David Parker,...
ICITS
2009
13 years 5 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...
BCSHCI
2009
13 years 5 months ago
Personality traits, usage patterns and information disclosure in online communities
Online communities of different types have become an important part of the daily internet life of many people within the last couple of years. Both research and business have show...
Johann Schrammel, Christina Köffel, Manfred T...
ICIP
2010
IEEE
13 years 5 months ago
Entropies and cross-entropies of exponential families
Statistical modeling of images plays a crucial role in modern image processing tasks like segmentation, object detection and restoration. Although Gaussian distributions are conve...
Frank Nielsen, Richard Nock