Sciweavers

5891 search results - page 1116 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
ECCV
2002
Springer
16 years 6 months ago
What Can Be Known about the Radiometric Response from Images?
Abstract. Brightness values of pixels in an image are related to image irradiance by a non-linear function, called the radiometric response function. Recovery of this function is i...
Michael D. Grossberg, Shree K. Nayar
194
Voted
MOBIHOC
2004
ACM
16 years 4 months ago
On greedy geographic routing algorithms in sensing-covered networks
Greedy geographic routing is attractive in wireless sensor networks due to its efficiency and scalability. However, greedy geographic routing may incur long routing paths or even ...
Guoliang Xing, Chenyang Lu, Robert Pless, Qingfeng...
111
Voted
SIGECOM
2004
ACM
104views ECommerce» more  SIGECOM 2004»
15 years 10 months ago
An economic answer to unsolicited communication
We explore an alternative approach to spam based on economic rather than technological or regulatory screening mechanisms. We employ a model of email value which supports two intu...
Thede Loder, Marshall W. van Alstyne, Rick Wash
WSNA
2003
ACM
15 years 9 months ago
Proximity interactions between wireless sensors and their application
Many applications in ubiquitous computing rely on knowing where people and objects are relative to each other. By placing small wireless sensors on people, at specific locations, ...
Waylon Brunette, Carl Hartung, Ben Nordstrom, Gaet...
SIGECOM
2010
ACM
183views ECommerce» more  SIGECOM 2010»
15 years 9 months ago
The unavailable candidate model: a decision-theoretic view of social choice
One of the fundamental problems in the theory of social choice is aggregating the rankings of a set of agents (or voters) into a consensus ranking. Rank aggregation has found appl...
Tyler Lu, Craig Boutilier
« Prev « First page 1116 / 1179 Last » Next »