Sciweavers

978 search results - page 164 / 196
» Knowledge, Probability, and Adversaries
Sort
View
JAIR
2011
133views more  JAIR 2011»
13 years 3 months ago
A Probabilistic Approach for Maintaining Trust Based on Evidence
Leading agent-based trust models address two important needs. First, they show how an agent may estimate the trustworthiness of another agent based on prior interactions. Second, ...
Yonghong Wang, Chung-Wei Hang, Munindar P. Singh
TMC
2011
137views more  TMC 2011»
13 years 3 months ago
Cognitive Medium Access: Exploration, Exploitation, and Competition
— This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wish...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...
MTA
2011
260views Hardware» more  MTA 2011»
13 years 3 months ago
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Quantization index modulation is one of the best methods for performing blind watermarking, due to its simplicity and good rate-distortion-robustness tradeoffs. In this paper, a ne...
Vivekananda Bhat K., Indranil Sengupta, Abhijit Da...
INTERSPEECH
2010
13 years 3 months ago
Hierarchical multilayer perceptron based language identification
Automatic language identification (LID) systems generally exploit acoustic knowledge, possibly enriched by explicit language specific phonotactic or lexical constraints. This pape...
David Imseng, Mathew Magimai-Doss, Hervé Bo...
TIP
2010
121views more  TIP 2010»
13 years 3 months ago
Optimal PET Protection for Streaming Scalably Compressed Video Streams With Limited Retransmission Based on Incomplete Feedback
For streaming scalably compressed video streams over unreliable networks, Limited-Retransmission Priority Encoding Transmission (LR-PET) outperforms PET remarkably since the opport...
Ruiqin Xiong, David Taubman, Vijay Sivaraman