Sciweavers

2008 search results - page 383 / 402
» MUC-4 evaluation metrics
Sort
View
TIFS
2008
208views more  TIFS 2008»
13 years 7 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
JCM
2007
73views more  JCM 2007»
13 years 7 months ago
A Link Adaptation Algorithm in MIMO-based WiMAX Systems
— In order to extend the coverage of wireless communication to metropolitan scale, the Worldwide Interoperability for Microwave Access (WiMAX) standard was developed and ratifie...
Tsz Ho Chan, Mounir Hamdi, Chui Ying Cheung, Maode...
CAGD
2005
88views more  CAGD 2005»
13 years 7 months ago
An efficient bit allocation for compressing normal meshes with an error-driven quantization
We propose a new wavelet compression algorithm based on the rate-distortion optimization for densely sampled triangular meshes. Exploiting the normal remesher of Guskov et al., th...
Frédéric Payan, Marc Antonini
TSMC
2008
109views more  TSMC 2008»
13 years 7 months ago
Providing Justifications in Recommender Systems
Abstract--Recommender systems are gaining widespread acceptance in e-commerce applications to confront the "information overload" problem. Providing justification to a re...
Panagiotis Symeonidis, Alexandros Nanopoulos, Yann...
JSAC
2007
72views more  JSAC 2007»
13 years 7 months ago
Diverse: application-layer service differentiation in peer-to-peer communications
— The peer-to-peer communication paradigm, when used to disseminate bulk content or to stream real-time multimedia, has enjoyed the distinct advantage of scalability when compare...
Chuan Wu, Baochun Li