Sciweavers

3116 search results - page 103 / 624
» Recovering
Sort
View
102
Voted
FOCS
1994
IEEE
15 years 7 months ago
Priority Encoding Transmission
We introduce a new method, called Priority Encoding Transmission, for sending messages over lossy packet-based networks. When a message is to be transmitted, the user speci es a p...
Andres Albanese, Johannes Blömer, Jeff Edmond...
ICASSP
2009
IEEE
15 years 6 months ago
Spoken dialog strategy based on understanding graph search
We regarded information retrieval as a graph search problem and proposed several novel dialog strategies that can recover from misrecognition through a spoken dialog that traverse...
Yuji Kinoshita, Chiyomi Miyajima, Norihide Kitaoka...
130
Voted
DASFAA
2009
IEEE
108views Database» more  DASFAA 2009»
15 years 6 months ago
An Effective and Efficient Method for Handling Transmission Failures in Sensor Networks
Abstract. The suppression scheme is a solution for limited energy constraints in sensor networks. Temporal suppression, spatial suppression and spatio-temporal suppression are prop...
Heejung Yang, Chin-Wan Chung
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
15 years 6 months ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang
COLT
2006
Springer
15 years 6 months ago
A Randomized Online Learning Algorithm for Better Variance Control
We propose a sequential randomized algorithm, which at each step concentrates on functions having both low risk and low variance with respect to the previous step prediction functi...
Jean-Yves Audibert