Sciweavers

305 search results - page 56 / 61
» Symmetric Enumeration Reducibility
Sort
View
MST
2011
184views Hardware» more  MST 2011»
13 years 4 months ago
Stackelberg Strategies and Collusion in Network Games with Splittable Flow
We study the impact of collusion in network games with splittable flow and focus on the well established price of anarchy as a measure of this impact. We first investigate symmet...
Tobias Harks
INFOCOM
2011
IEEE
13 years 1 months ago
Experimental evaluation of optimal CSMA
Abstract—By ‘optimal CSMA’ we denote a promising approach to maximize throughput-based utility in wireless networks without message passing or synchronization among nodes. De...
Bruno Nardelli, Jinsung Lee, Kangwook Lee, Yung Yi...
CVPR
2006
IEEE
14 years 12 months ago
Selecting Principal Components in a Two-Stage LDA Algorithm
Linear Discriminant Analysis (LDA) is a well-known and important tool in pattern recognition with potential applications in many areas of research. The most famous and used formul...
Aleix M. Martínez, Manli Zhu
VIS
2004
IEEE
161views Visualization» more  VIS 2004»
14 years 11 months ago
Automatic Fast Detection of Tumor Suspect Areas on CT Scan
Our research deals with a fully automatic and fast visualization of possible tumoral areas on CT Scan images. To achieve this task, we use the bilateral symmetry of the human body...
Benoit M. Macq, Bernard Gosselin, Matei Mancas
EUROCRYPT
2009
Springer
14 years 10 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...