Sciweavers

125 search results - page 13 / 25
» Linear Cryptanalysis Using Multiple Approximations and FEAL
Sort
View
SIGMOD
2004
ACM
154views Database» more  SIGMOD 2004»
14 years 7 months ago
Compressing Historical Information in Sensor Networks
We are inevitably moving into a realm where small and inexpensive wireless devices would be seamlessly embedded in the physical world and form a wireless sensor network in order t...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
VTC
2008
IEEE
153views Communications» more  VTC 2008»
14 years 2 months ago
Symbol Error Rate of Space-Time Coded Multi-Antenna Wireless Cooperative Networks
—In this paper, we propose a generalized cooperative signal transmission model for wireless networks. In this model, the source, the destination, and an arbitrary number of relay...
Javad Vazifehdan, Jos H. Weber
WWW
2011
ACM
13 years 2 months ago
An expressive mechanism for auctions on the web
Auctions are widely used on the Web. Applications range from internet advertising to platforms such as eBay. In most of these applications the auctions in use are single/multi-ite...
Paul Dütting, Monika Henzinger, Ingmar Weber
ICCV
2009
IEEE
15 years 18 days ago
Deformable Model Fitting with a Mixture of Local Experts
Local experts have been used to great effect for fitting deformable models to images. Typically, the best location in an image for the deformable model’s landmarks are found t...
Jason M. Saragih, Simon Lucey, Jeffrey F. Cohn
PVM
2004
Springer
14 years 1 months ago
A Refinement Strategy for a User-Oriented Performance Analysis
We introduce a refinement strategy to bring the parallel performance analysis closer to the user. The analysis starts with a simple high-level performance model. It is based on fir...
Jan Lemeire, Andy Crijns, John Crijns, Erik F. Dir...