Sciweavers

886 search results - page 142 / 178
» Generalized Bezout Identity
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
The Capacity of Heterogeneous Wireless Networks
—Although capacity has been extensively studied in wireless networks, most of the results are for homogeneous wireless networks where all nodes are assumed identical. In this pap...
Pan Li, Yuguang Fang
CHI
2011
ACM
13 years 18 days ago
Designing a phone broadcasting system for urban sex workers in India
In this paper, we present the design, implementation, and deployment of a phone-based broadcasting system designed for reaching out to at-risk populations in urban India. We worke...
Nithya Sambasivan, Julie Weber, Edward Cutrell
SIGECOM
2011
ACM
203views ECommerce» more  SIGECOM 2011»
12 years 12 months ago
Polynomial-time computation of exact correlated equilibrium in compact games
In a landmark paper, Papadimitriou and Roughgarden [2008] described a polynomial-time algorithm (“Ellipsoid Against Hope”) for computing sample correlated equilibria of concis...
Albert Xin Jiang, Kevin Leyton-Brown
ASIACRYPT
2011
Springer
12 years 9 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
CVPR
2003
IEEE
14 years 11 months ago
Independent Component Analysis in a Facial Local Residue Space
In this paper, we propose an ICA(Indepdendent Component Analysis) based face recognition algorithm, which is robust to illumination and pose variation. Generally, it is well known...
Tae-Kyun Kim, Hyunwoo Kim, Wonjun Hwang, Seok-Cheo...