Sciweavers

2038 search results - page 284 / 408
» Loops under Strategies
Sort
View
FOCS
2007
IEEE
15 years 10 months ago
Mechanism Design via Differential Privacy
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic age...
Frank McSherry, Kunal Talwar
ICC
2007
IEEE
145views Communications» more  ICC 2007»
15 years 10 months ago
Predicting User-Perceived Quality Ratings from Streaming Media Data
Abstract—Media stream quality is highly dependent on underlying network conditions, but identifying scalable, unambiguous metrics to discern the user-perceived quality of a media...
Amy Csizmar Dalal, David R. Musicant, Jamie F. Ols...
ICC
2007
IEEE
15 years 10 months ago
ZigBee-based Intra-car Wireless Sensor Network
— Due to an increasing number of sensors deployed in cars, recently there is a growing interest in implementing a wireless sensor network within a car. In this paper, we report t...
Hsin-Mu Tsai, Cem U. Saraydar, Timothy Talty, Mich...
ICC
2007
IEEE
15 years 10 months ago
Cooperative Concatenated Coding for Wireless Systems
– Cooperative transmission has been of growing interest recently where users take advantage of each other’s resources for better overall performance. In this paper, coded coope...
Ernest S. Lo, Khaled Ben Letaief
ICC
2007
IEEE
173views Communications» more  ICC 2007»
15 years 10 months ago
Using Incompletely Cooperative Game Theory in Mobile Ad Hoc Networks
—Recently, game theory becomes a useful and powerful tool to research mobile ad hoc networks (MANETs). Wireless LANs (WLANs) can work under both infrastructure and ad hoc modes, ...
Liqiang Zhao, Jie Zhang, Kun Yang, Hailin Zhang