Sciweavers

727 search results - page 11 / 146
» Two thresholds are better than one
Sort
View
HCI
2009
13 years 5 months ago
Flight Searching - A Comparison of Two User-Interface Design Strategies
The most usable user-interface is not necessarily the most popular. For example, the extent to which an interaction is based on graphics can depend highly on convention rather than...
Antti Pirhonen, Niko Kotilainen
SIAMJO
2010
246views more  SIAMJO 2010»
13 years 6 months ago
A Singular Value Thresholding Algorithm for Matrix Completion
This paper introduces a novel algorithm to approximate the matrix with minimum nuclear norm among all matrices obeying a set of convex constraints. This problem may be understood a...
Jian-Feng Cai, Emmanuel J. Candès, Zuowei S...
ICASSP
2011
IEEE
12 years 11 months ago
A knapsack problem formulation for relay selection in secure cooperative wireless communication
—Cooperative jamming (CJ) schemes support secure wireless communication in the presence of one or more eavesdroppers. Larger numbers of cooperative relays provide better secrecy ...
Shuangyu Luo, Hana Godrich, Athina P. Petropulu, H...
GLOBECOM
2006
IEEE
14 years 1 months ago
Two Novel Iterative Joint Frequency-Offset and Channel Estimation Methods for OFDMA Uplink
—We address joint estimation of frequency offsets and channel responses in OFDMA uplink. A cyclically equal-spaced, equal-energy interleaved pilot preamble is proposed by which t...
Xiaoyu Fu, Hlaing Minn, Cyrus D. Cantrell
IACR
2011
97views more  IACR 2011»
12 years 7 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen