Sciweavers

1763 search results - page 275 / 353
» Dependent random choice
Sort
View
MM
1999
ACM
117views Multimedia» more  MM 1999»
14 years 7 days ago
NAIVE - network aware Internet video encoding
The distribution of digital video content over computer networks has become commonplace. Unfortunately, most digital video encoding standards do not degrade gracefully in the face...
Héctor M. Briceño, Steven J. Gortler...
CRYPTO
1999
Springer
109views Cryptology» more  CRYPTO 1999»
14 years 6 days ago
Coding Constructions for Blacklisting Problems without Computational Assumptions
Abstract. We consider the broadcast exclusion problem: how to transmit a message over a broadcast channel shared by N = 2n users so that all but some specified coalition of k excl...
Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
STOC
1998
ACM
125views Algorithms» more  STOC 1998»
14 years 5 days ago
Spot-Checkers
On Labor Day weekend, the highway patrol sets up spot-checks at random points on the freeways with the intention of deterring a large fraction of motorists from driving incorrectl...
Funda Ergün, Sampath Kannan, Ravi Kumar, Roni...
STOC
1998
ACM
190views Algorithms» more  STOC 1998»
14 years 5 days ago
Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces
We address the problem of designing data structures that allow efficient search for approximate nearest neighbors. More specifically, given a database consisting of a set of vecto...
Eyal Kushilevitz, Rafail Ostrovsky, Yuval Rabani
IH
1998
Springer
14 years 4 days ago
Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks
Theoretical modeling of watermarks allow prediction of the detector reliability and facilitates the development of more reliable systems. In particular, mathematical evaluation is ...
Jean-Paul M. G. Linnartz, Ton Kalker, Geert Depove...