Sciweavers

10899 search results - page 2004 / 2180
» Wide Area Computation
Sort
View
APPROX
2010
Springer
139views Algorithms» more  APPROX 2010»
15 years 6 months ago
Two-Source Extractors Secure against Quantum Adversaries
We initiate the study of multi-source extractors in the quantum world. In this setting, our goal is to extract random bits from two independent weak random sources, on which two q...
Roy Kasher, Julia Kempe
INTERACT
2007
15 years 6 months ago
Exploring Temporal Communication Through Social Networks
The dissemination of information in social networks and the relative effect of ICT (Information and Communications Technology) use has long been an interesting area of study in the...
Liaquat Hossain, Kon Shing Kenneth Chung, Shahriar...
WICON
2008
15 years 6 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
163
Voted
DAGSTUHL
2006
15 years 6 months ago
The Space of Cognitive Vision
Cognitive vision is an area that is not yet well-defined, in the sense that one can unambiguously state what issues fall under its purview and what considerations do not. Neither i...
David Vernon
NIPS
2001
15 years 6 months ago
Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering
Drawing on the correspondence between the graph Laplacian, the Laplace-Beltrami operator on a manifold, and the connections to the heat equation, we propose a geometrically motiva...
Mikhail Belkin, Partha Niyogi
« Prev « First page 2004 / 2180 Last » Next »