Sciweavers

199 search results - page 23 / 40
» Randomised Individual Communication Complexity
Sort
View
INFOCOM
2010
IEEE
13 years 4 months ago
On the Feasibility and Efficacy of Protection Routing in IP Networks
With network components increasingly reliable, routing is playing an ever greater role in determining network reliability. This has spurred much activity in improving routing stabi...
Kin Wah Kwong, Lixin Gao, Roch Guérin, Zhi-...
ICCV
2005
IEEE
14 years 9 months ago
Probabilistic Contour Extraction Using Hierarchical Shape Representation
In this paper, we address the issue of extracting contour of the object with a specific shape. A hierarchical graphical model is proposed to represent shape variations. A complex ...
Xin Fan, Chun Qi, Dequn Liang, Hua Huang
CEAS
2005
Springer
14 years 1 months ago
Email Task Management: An Iterative Relational Learning Approach
Today’s email clients were designed for yesterday’s email. Originally, email was merely a communication medium. Today, people engage in a variety of complex behaviours using e...
Rinat Khoussainov, Nicholas Kushmerick
CSSE
2006
IEEE
13 years 7 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
TWC
2008
103views more  TWC 2008»
13 years 7 months ago
Semi-Distributed User Relaying Algorithm for Amplify-and-Forward Wireless Relay Networks
In this paper, designing an effective user relaying algorithm, in terms of relay node selection and power allocation, is discussed for amplify-and-forward wireless relay networks. ...
Jun Cai, Xuemin Shen, Jon W. Mark, Attahiru Sule A...