Sciweavers

1616 search results - page 253 / 324
» Robust game theory
Sort
View
ISCAS
2005
IEEE
197views Hardware» more  ISCAS 2005»
14 years 2 months ago
Averaging attack resilient video fingerprinting
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
RTSS
2005
IEEE
14 years 2 months ago
Decentralized Utilization Control in Distributed Real-Time Systems
Many real-time systems must control their CPU utilizations in order to meet end-to-end deadlines and prevent overload. Utilization control is particularly challenging in distribut...
Xiaorui Wang, Dong Jia, Chenyang Lu, Xenofon D. Ko...
WIOPT
2005
IEEE
14 years 2 months ago
Power Control for Multicell CDMA Wireless Networks: A Team Optimization Approach
We study power control in multicell CDMA wireless networks as a team optimization problem where each mobile attains at the minimum its individual fixed target SIR level and beyon...
Tansu Alpcan, Xingzhe Fan, Tamer Basar, Murat Arca...
KDD
2004
ACM
145views Data Mining» more  KDD 2004»
14 years 2 months ago
A graph-theoretic approach to extract storylines from search results
We present a graph-theoretic approach to discover storylines from search results. Storylines are windows that offer glimpses into interesting themes latent among the top search re...
Ravi Kumar, Uma Mahadevan, D. Sivakumar
INFOCOM
2003
IEEE
14 years 2 months ago
Time-Optimal Network Queue Control: The Case of a Single Congested Node
-We solve the problem of time-optimal network queue control: what are the input data rates that make network queue sizes converge to their ideal size in the least possible time aft...
Mahadevan Iyer, Wei Kang Tsai