Sciweavers

42388 search results - page 8460 / 8478
» Classification Using Information
Sort
View
TISSEC
2010
237views more  TISSEC 2010»
13 years 3 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
TIT
2010
156views Education» more  TIT 2010»
13 years 3 months ago
Bandwidth and power allocation for cooperative strategies in Gaussian relay networks
Abstract-- In a relay network with a single sourcedestination pair, we examine the achievable rates with amplifyand-forward (AF) relaying strategy. Motivated by applications in sen...
Ivana Maric, Roy D. Yates
TMC
2010
103views more  TMC 2010»
13 years 3 months ago
Optimal Cooperative Relaying Schemes in IR-UWB Networks
Cooperation between wireless nodes to retransmit data for the other users introduces multiuser diversity to a wireless network and increases the system throughput. In this paper, t...
Ghasem Naddafzadeh Shirazi, Peng Yong Kong, Chen-K...
TMM
2010
253views Management» more  TMM 2010»
13 years 3 months ago
Multi-View Video Summarization
Previous video summarization studies focused on monocular videos, and the results would not be good if they were applied to multi-view videos directly, due to problems such as the ...
Yanwei Fu, Yanwen Guo, Yanshu Zhu, Feng Liu, Chuan...
TMM
2010
194views Management» more  TMM 2010»
13 years 3 months ago
Modeling Flickr Communities Through Probabilistic Topic-Based Analysis
Abstract--With the increased presence of digital imaging devices, there also came an explosion in the amount of multimedia content available online. Users have transformed from pas...
Radu Andrei Negoescu, Daniel Gatica-Perez
« Prev « First page 8460 / 8478 Last » Next »