Sciweavers

7318 search results - page 1430 / 1464
» Models of real-valued measurability
Sort
View
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
13 years 11 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
ICMAS
1998
13 years 11 months ago
Emergent Properties of a Market-based Digital Library with Strategic Agents
The University of Michigan Digital Library (UMDL) is an open system that allows third-parties to build and integrate their own profit-seeking agents into the marketplace of inform...
Sunju Park, Edmund H. Durfee, William P. Birmingha...
AAAI
1994
13 years 11 months ago
Exploiting Meta-Level information in a Distributed Scheduling System
In this paper, we study the problem of achieving efficient interaction in a distributed scheduling system whose scheduling agents may borrow resources from one another. Specifical...
Daniel E. Neiman, David W. Hildum, Victor R. Lesse...
IJCAI
1989
13 years 11 months ago
Chromatic Stereopsis
It is well known that chromatic information can assist in solving the stereo correspondence problem. It has also been suggested that there are two independent first-order stereop...
John R. Jordan III, Alan C. Bovik, Wilson S. Geisl...
WCE
2007
13 years 11 months ago
An Improved Sparge Pipe Air Distribution System for a Fluidised Bed Combustor
The purpose of the air distribution system in a fluidised bed combustor is to provide a reasonably uniform spread of combustion air over the entire horizontal cross-sectional area...
D. R. Garwood, J. Ward, D. R. Bowen, M. Fisher, D....
« Prev « First page 1430 / 1464 Last » Next »