Sciweavers

628 search results - page 57 / 126
» Designing the perfect auction
Sort
View
APGV
2006
ACM
138views Visualization» more  APGV 2006»
13 years 12 months ago
Verification of rendering quality from measured BTFs
One of the most important, still unsolved problems in computer graphics is the generation of predictive imagery, i.e., images that represent perfect renditions of reality. Such pe...
Jan Meseth, Gero Müller, Reinhard Klein, Flor...
SIAMJO
2008
175views more  SIAMJO 2008»
13 years 10 months ago
On Bin Packing with Conflicts
Abstract. We consider the offline and online versions of a bin packing problem called bin packing with conflicts. Given a set of items V = {1, 2, . . . , n} with sizes s1, s2 . . ....
Leah Epstein, Asaf Levin
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 8 months ago
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
—In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper. In part...
Amitav Mukherjee, A. Lee Swindlehurst
IJNSEC
2006
111views more  IJNSEC 2006»
13 years 10 months ago
Ideal Secret Sharing Schemes from Permutations
The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restri...
Josef Pieprzyk, Xian-Mo Zhang
COLING
2010
13 years 5 months ago
Towards the Adequate Evaluation of Morphosyntactic Taggers
There exists a well-established and almost unanimously adopted measure of tagger performance, namely, accuracy. Although it is perfectly adequate for small tagsets and typical app...
Szymon Acedanski, Adam Przepiórkowski