Sciweavers

425 search results - page 60 / 85
» On the additive constant of the k-server Work Function Algor...
Sort
View
CSFW
2012
IEEE
11 years 10 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
ICIP
2006
IEEE
14 years 9 months ago
Improving H.264/AVC Inter Compression with Multiscale Recurrent Patterns
In this paper we describe the ongoing work on a new paradigm for compressing the motion predicted error in a video coder, referred to as MMP-Video. This new coding algorithm uses ...
Eduardo A. B. da Silva, Murilo B. de Carvalho, Nun...
ICC
2009
IEEE
107views Communications» more  ICC 2009»
14 years 2 months ago
EM-Based Maximum-Likelihood Sequence Detection for MIMO Optical Wireless Systems
—A major performance-limiting factor in terrestrial optical wireless (OW) systems is turbulence-induced fading. Exploiting the additional degrees of freedom in the spatial dimens...
Nestor D. Chatzidiamantis, Murat Uysal, Theodoros ...
JUCS
2002
119views more  JUCS 2002»
13 years 7 months ago
Error-Correction, and Finite-Delay Decodability
: When the words of a language are communicated via a noisy channel, the language property of error-detection ensures that no word of the language can be transformed to another wor...
Stavros Konstantinidis
ICDM
2010
IEEE
132views Data Mining» more  ICDM 2010»
13 years 5 months ago
Monotone Relabeling in Ordinal Classification
In many applications of data mining we know beforehand that the response variable should be increasing (or decreasing) in the attributes. Such relations between response and attrib...
Ad Feelders