Sciweavers

3735 search results - page 744 / 747
» Order compression schemes
Sort
View
USS
2010
13 years 7 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
VTC
2010
IEEE
185views Communications» more  VTC 2010»
13 years 7 months ago
Fuzzy Logic Aided Dynamic Source Routing in Cross-Layer Operation Assisted Ad Hoc Networks
1The classic Dynamic Source Routing (DSR) protocol opts for the route requiring the lowest number of hops for transmitting data from the source to the destination. However, owing t...
Jing Zuo, Soon Xin Ng, Lajos Hanzo
EGH
2009
Springer
13 years 7 months ago
Faster incoherent rays: Multi-BVH ray stream tracing
High fidelity rendering via ray tracing requires tracing incoherent rays for global illumination and other secondary effects. Recent research show that the performance benefits fr...
John A. Tsakok
EUSFLAT
2009
146views Fuzzy Logic» more  EUSFLAT 2009»
13 years 7 months ago
Opposite Fuzzy Sets with Applications in Image Processing
Diverse forms of the concept of opposition are already existent in philosophy, linguistics, psychology and physics. The interplay between entities and opposite entities is apparent...
Hamid R. Tizhoosh
IEEECSA
2009
13 years 7 months ago
Multiratecast in Wireless Fault Tolerant Sensor and Actuator Networks
We study the multicast problem in wireless sensor networks, where the source can send data to a fixed number of destinations (actuators) at a different rate (multiratecast). A typi...
Xuehong Liu, Arnaud Casteigts, Nishith Goel, Amiya...