Sciweavers

10263 search results - page 1949 / 2053
» From Use Cases to System Operation Specifications
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Path disruption games
We propose Path Disruption Games (PDGs), which consider collaboration between agents attempting stop an adversary from travelling from a source node to a target node in a graph. P...
Yoram Bachrach, Ely Porat
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
12 years 8 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
ECCV
2002
Springer
14 years 10 months ago
Linear Multi View Reconstruction with Missing Data
General multi view reconstruction from affine or projective cameras has so far been solved most efficiently using methods of factorizing image data matrices into camera and scene p...
Carsten Rother, Stefan Carlsson
WCNC
2008
IEEE
14 years 3 months ago
Proportional Fair Scheduling: Analytical Insight under Rayleigh Fading Environment
—This paper provides analytical expressions to evaluate the performance of a random access wireless network in terms of user throughput and network throughput, subject to the con...
Erwu Liu, Kin K. Leung
ATAL
2003
Springer
14 years 2 months ago
Trade of a problem-solving task
This paper focuses on a task allocation problem, particularly in cases where the task is to find a solution to a search problem or a constraint satisfaction problem. If the searc...
Shigeo Matsubara
« Prev « First page 1949 / 2053 Last » Next »