Sciweavers

159 search results - page 4 / 32
» Generating Functions for Computing the Myerson Value
Sort
View
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
14 years 1 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
SIBGRAPI
2005
IEEE
14 years 1 months ago
Two-Level Interaction Approach for Transfer Function Specification
Direct volume rendering techniques are used to visualize and explore large scalar volumes. Transfer functions (TFs) that assign opacity and color to scalar values are very importa...
João Luis Prauchner, Carla M. D. S. Freitas...
AAAI
2010
13 years 9 months ago
Coalition Structure Generation based on Distributed Constraint Optimization
Forming effective coalitions is a major research challenge in AI and multi-agent systems (MAS). Coalition Structure Generation (CSG) involves partitioning a set of agents into coa...
Suguru Ueda, Atsushi Iwasaki, Makoto Yokoo, Marius...
VTC
2006
IEEE
14 years 1 months ago
MAC Access Delay In IEEE 802.11e EDCA
— In this paper, we study the MAC access delay of EDCA in the draft IEEE 802.11e standard under saturated conditions. We obtain explicit expressions for the mean, the standard de...
Dongxia Xu, Taka Sakurai, Hai Le Vu
CVPR
1998
IEEE
13 years 11 months ago
Minimax Entropy and Learning by Diffusion
1 A system of coupled differential equations is formulated which learns priors for modelling "preattentive" textures. It is derived from an energy functional consisting o...
Jayant Shah