Sciweavers

3116 search results - page 103 / 624
» Recovering
Sort
View
FOCS
1994
IEEE
14 years 1 months ago
Priority Encoding Transmission
We introduce a new method, called Priority Encoding Transmission, for sending messages over lossy packet-based networks. When a message is to be transmitted, the user speci es a p...
Andres Albanese, Johannes Blömer, Jeff Edmond...
ICASSP
2009
IEEE
14 years 1 months ago
Spoken dialog strategy based on understanding graph search
We regarded information retrieval as a graph search problem and proposed several novel dialog strategies that can recover from misrecognition through a spoken dialog that traverse...
Yuji Kinoshita, Chiyomi Miyajima, Norihide Kitaoka...
DASFAA
2009
IEEE
108views Database» more  DASFAA 2009»
14 years 28 days ago
An Effective and Efficient Method for Handling Transmission Failures in Sensor Networks
Abstract. The suppression scheme is a solution for limited energy constraints in sensor networks. Temporal suppression, spatial suppression and spatio-temporal suppression are prop...
Heejung Yang, Chin-Wan Chung
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
14 years 26 days ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang
COLT
2006
Springer
14 years 26 days ago
A Randomized Online Learning Algorithm for Better Variance Control
We propose a sequential randomized algorithm, which at each step concentrates on functions having both low risk and low variance with respect to the previous step prediction functi...
Jean-Yves Audibert