Sciweavers

2924 search results - page 565 / 585
» Lower Bounds in Distributed Computing
Sort
View
CIVR
2008
Springer
222views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Automatic image annotation via local multi-label classification
As the consequence of semantic gap, visual similarity does not guarantee semantic similarity, which in general is conflicting with the inherent assumption of many generativebased ...
Mei Wang, Xiangdong Zhou, Tat-Seng Chua
CORR
2010
Springer
185views Education» more  CORR 2010»
13 years 7 months ago
Estimating and Sampling Graphs with Multidimensional Random Walks
Estimating characteristics of large graphs via sampling is a vital part of the study of complex networks. Current sampling methods such as (independent) random vertex and random w...
Bruno F. Ribeiro, Donald F. Towsley
TWC
2008
105views more  TWC 2008»
13 years 7 months ago
Receive Antenna Array Strategies in Fading and Interference: An Outage Probability Comparison
We explore tradeoffs between different reception strategies of multiple receive antennas in fading channels with co-channel interference (CCI). Our tradeoff analysis is based on ou...
Juan M. Romero-Jerez, Andrea J. Goldsmith
PPOPP
2010
ACM
14 years 4 months ago
Scaling LAPACK panel operations using parallel cache assignment
In LAPACK many matrix operations are cast as block algorithms which iteratively process a panel using an unblocked algorithm and then update a remainder matrix using the high perf...
Anthony M. Castaldo, R. Clint Whaley
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
14 years 8 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...