Sciweavers

5900 search results - page 1117 / 1180
» Dependable Systems
Sort
View
SIGECOM
2009
ACM
111views ECommerce» more  SIGECOM 2009»
14 years 4 months ago
A qualitative vickrey auction
Restricting the preferences of the agents by assuming that their utility functions linearly depend on a payment allows for the positive results of the Vickrey auction and the Vick...
Paul Harrenstein, Mathijs de Weerdt, Vincent Conit...
SIGGRAPH
2009
ACM
14 years 4 months ago
Educating technophile artists: experiences from a highly successful computer animation undergraduate programme
Over the past few decades, the arts have become increasingly dependent on and influenced by the development of computer technology. In the 1960s pioneering artists experimented w...
Peter Comninos, Leigh McLoughlin, Eike Falk Anders...
MIR
2010
ACM
264views Multimedia» more  MIR 2010»
14 years 4 months ago
Quest for relevant tags using local interaction networks and visual content
Typical tag recommendation systems for photos shared on social networks such as Flickr, use visual content analysis, collaborative filtering or personalization strategies to prod...
Neela Sawant, Ritendra Datta, Jia Li, James Ze Wan...
ACSAC
2008
IEEE
14 years 4 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
CISS
2008
IEEE
14 years 4 months ago
Compressed channel sensing
—Reliable wireless communications often requires accurate knowledge of the underlying multipath channel. This typically involves probing of the channel with a known training wave...
Waheed Uz Zaman Bajwa, Jarvis Haupt, Gil M. Raz, R...
« Prev « First page 1117 / 1180 Last » Next »