Sciweavers

1031 search results - page 97 / 207
» Broadcasting with Selective Reduction
Sort
View
AAAI
2007
14 years 12 days ago
Adaptive Traitor Tracing with Bayesian Networks
The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
Philip Zigoris, Hongxia Jin
IJCAI
2003
13 years 11 months ago
Getting Serious about the Development of Computational Humor
Society needs humor, not just for entertainment. In the Web age, presentations become more and more flexible and personalized and they will require hu­ mor contributions for elec...
Oliviero Stock, Carlo Strapparava
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 10 months ago
Opportunistic Network Coding for Video Streaming over Wireless
— In this paper, we study video streaming over wireless networks with network coding capabilities. We build upon recent work, which demonstrated that network coding can increase ...
Hulya Seferoglu, Athina Markopoulou
FTCIT
2007
88views more  FTCIT 2007»
13 years 10 months ago
Topics in Multi-User Information Theory
This survey reviews fundamental concepts of multi-user information theory. Starting with typical sequences, the survey builds up knowledge on random coding, binning, superposition...
Gerhard Kramer
TCS
1998
13 years 9 months ago
Conflict-Free Channel Set Assignment for an Optical Cluster Interconnection Network Based on Rotator Digraphs
Recently a class of scalable multi-star optical networks is proposed in [2]. In this class of networks nodes are grouped into clusters. Each cluster employs a separate pair of bro...
Peng-Jun Wan