Sciweavers

1132 search results - page 220 / 227
» Upper and lower Ramsey bounds in bounded arithmetic
Sort
View
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 22 days ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
INFOCOM
2005
IEEE
14 years 9 days ago
Optimal utility based multi-user throughput allocation subject to throughput constraints
— We consider the problem of scheduling multiple users sharing a time-varying wireless channel. (As an example, this is a model of scheduling in 3G wireless technologies, such as...
Matthew Andrews, Lijun Qian, Alexander L. Stolyar
CIKM
2005
Springer
14 years 8 days ago
Towards estimating the number of distinct value combinations for a set of attributes
Accurately and efficiently estimating the number of distinct values for some attribute(s) or sets of attributes in a data set is of critical importance to many database operation...
Xiaohui Yu, Calisto Zuzarte, Kenneth C. Sevcik
MMDB
2004
ACM
153views Multimedia» more  MMDB 2004»
14 years 4 days ago
A PCA-based similarity measure for multivariate time series
Multivariate time series (MTS) datasets are common in various multimedia, medical and financial applications. We propose a similarity measure for MTS datasets, Eros (Extended Fro...
Kiyoung Yang, Cyrus Shahabi
WSNA
2003
ACM
13 years 12 months ago
Analysis on the redundancy of wireless sensor networks
Wireless sensor networks consist of a large number of tiny sensors that have only limited energy supply. One of the major challenges in constructing such networks is to maintain l...
Yong Gao, Kui Wu, Fulu Li