Sciweavers

612 search results - page 65 / 123
» Hardness assumptions in the foundations of theoretical compu...
Sort
View
FOCS
2003
IEEE
14 years 1 months ago
Towards a Characterization of Truthful Combinatorial Auctions
This paper analyzes implementable social choice functions (in dominant strategies) over restricted domains of preferences, the leading example being combinatorial auctions. Our wo...
Ron Lavi, Ahuva Mu'alem, Noam Nisan
TCS
2011
13 years 2 months ago
Dynamic normal forms and dynamic characteristic polynomial
Abstract. We present the first fully dynamic algorithm for computing the characteristic polynomial of a matrix. In the generic symmetric case our algorithm supports rank-one updat...
Gudmund Skovbjerg Frandsen, Piotr Sankowski
ICALP
2005
Springer
14 years 1 months ago
Optimistic Asynchronous Atomic Broadcast
This paper presents a new protocol for atomic broadcast in an asynchronous network with a maximal number of Byzantine failures. It guarantees both safety and liveness without maki...
Klaus Kursawe, Victor Shoup
MOBIHOC
2005
ACM
14 years 7 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
CIVR
2007
Springer
160views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Automatic image annotation by an iterative approach: incorporating keyword correlations and region matching
Automatic image annotation automatically labels image content with semantic keywords. For instance, the Relevance Model estimates the joint probability of the keyword and the imag...
Xiangdong Zhou, Mei Wang, Qi Zhang, Junqi Zhang, B...