Sciweavers

886 search results - page 129 / 178
» Generalized Bezout Identity
Sort
View
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 9 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
TASLP
2008
61views more  TASLP 2008»
13 years 9 months ago
Spectral Representations of Nonmodal Phonation
Abstract--Regions of nonmodal phonation, which exhibit deviations from uniform glottal-pulse periods and amplitudes, occur often in speech and convey information about linguistic c...
Nicolas Malyska, Thomas F. Quatieri
TIT
2008
103views more  TIT 2008»
13 years 9 months ago
Fast Distributed Algorithms for Computing Separable Functions
The problem of computing functions of values at the nodes in a network in a fully distributed manner, where nodes do not have unique identities and make decisions based only on loc...
Damon Mosk-Aoyama, Devavrat Shah
TSMC
2008
104views more  TSMC 2008»
13 years 9 months ago
Head Yaw Estimation From Asymmetry of Facial Appearance
This paper proposes a novel method to estimate the head yaw rotations based on the asymmetry of 2-D facial appearance. In traditional appearance-based pose estimation methods, feat...
Bingpeng Ma, Shiguang Shan, Xilin Chen, Wen Gao
TWC
2008
130views more  TWC 2008»
13 years 9 months ago
On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance
We consider a multi-channel opportunistic communication system where the states of these channels evolve as independent and statistically identical Markov chains (the Gilbert-Elli...
Qing Zhao, Bhaskar Krishnamachari, Keqin Liu