Sciweavers

574 search results - page 75 / 115
» Robust Factorization
Sort
View
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 4 months ago
Impact of Interference and Medium Access Control on Flow Allocation in Multi-Hop Wireless Networks
—The interaction between MAC protocols and interference in wireless multi-hop networks introduces extra constraints on achievable flow rates. In this paper, we formulate an optim...
Kun-da Wu, Wanjiun Liao
ISBI
2007
IEEE
14 years 4 months ago
Validation and Comparison of Analytical Q-Ball Imaging Methods
Q-ball imaging (QBI), introduced by D. Tuch, reconstructs the diffusion orientation distribution function (ODF) of the underlying fiber population of a biological tissue. An anal...
Maxime Descoteaux, Peter Savadjiev, Jennifer S. W....
ISCC
2007
IEEE
100views Communications» more  ISCC 2007»
14 years 4 months ago
End-to-End Mean Bandwidth Estimation as a Function of Packet Length in Mobile Ad Hoc Networks
Many methods for end-to-end bandwidth estimation on wired networks assume that link capacities are constant and that all cross-traffic interaction occurs through queuing delays at...
Marco A. Alzate, Maria P. Salamanca, Néstor...
ICASSP
2007
IEEE
14 years 4 months ago
Breaking the Limitation of Manifold Analysis for Super-Resolution of Facial Images
A novel method for robust super-resolution offace images is proposed in this paper. Face super-resolution is a particular interest in video surveillance where face images have typ...
Sung Won Park, Marios Savvides
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
14 years 4 months ago
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S. Conditional disclosure of secrets (CDS) helps to overcom...
Sven Laur, Helger Lipmaa