Sciweavers

886 search results - page 120 / 178
» Generalized Bezout Identity
Sort
View
DIM
2007
ACM
14 years 1 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...
CANDT
2009
14 years 1 months ago
Hometown websites: continuous maintenance of cross-border connections
Information and Communication Technologies (ICT) become particularly relevant in contexts where place-based communities get dispersed and migrants look for ways to keep strong con...
Luís A. Castro, Victor M. Gonzalez
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 29 days ago
Channel-Matched Spreading Codes for the Downlink of MC-CDMA
Abstract-- This paper concerns the multiple access performance of spreading codes used in the downlink of multicarrier code-division multiple-access (MC-CDMA). Complex-valued sprea...
Qinghua Shi, Yong Liang Guan, Choi Look Law
ATAL
2006
Springer
14 years 25 days ago
False-name-proof combinatorial auction protocol: Groves Mechanism with SubModular Approximation
This paper develops a new combinatorial auction protocol called the Groves Mechanism with SubModular Approximation (GM-SMA). This protocol satisfies the following characteristics:...
Makoto Yokoo, Toshihiro Matsutani, Atsushi Iwasaki
DAWAK
2006
Springer
14 years 23 days ago
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Abstract. Biobanks are gaining in importance by storing large collections of patient's clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) toget...
Konrad Stark, Johann Eder, Kurt Zatloukal