Sciweavers

1921 search results - page 289 / 385
» The Student-Project Allocation Problem
Sort
View
ESA
2009
Springer
156views Algorithms» more  ESA 2009»
15 years 9 months ago
On Revenue Maximization in Second-Price Ad Auctions
Abstract. Most recent papers addressing the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions assume that pricing is done via a first...
Yossi Azar, Benjamin E. Birnbaum, Anna R. Karlin, ...
129
Voted
ICIP
2008
IEEE
16 years 4 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
132
Voted
ICIP
2007
IEEE
16 years 4 months ago
Stream Authentication Based on Generlized Butterfly Graph
This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph sup...
Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, ...
ICIP
2001
IEEE
16 years 3 months ago
Minimizing transmission energy in wireless video communications
A key constraint in mobile communications is the reliance on a battery with a limited energy supply. Efficiently utilizing the available energy is therefore an important design co...
Yiftach Eisenberg, Thrasyvoulos N. Pappas, Randall...
ICDE
2005
IEEE
183views Database» more  ICDE 2005»
16 years 3 months ago
Adaptive Caching for Continuous Queries
We address the problem of executing continuous multiway join queries in unpredictable and volatile environments. Our query class captures windowed join queries in data stream syst...
Shivnath Babu, Kamesh Munagala, Jennifer Widom, Ra...