Sciweavers

26 search results - page 4 / 6
» air 2011
Sort
View
JAIR
2011
214views more  JAIR 2011»
12 years 11 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
EJWCN
2011
87views more  EJWCN 2011»
13 years 3 months ago
Resource Allocation for Overlapping MBS Zones
— Multicast and broadcast service (MBS) is one of the important services for next generation wireless systems. In WiMAX, the radio resource unit (i.e., time, frequency, code, etc...
Ray-Guang Cheng, Kuo-Jui Huang
SYNTHESE
2011
96views more  SYNTHESE 2011»
13 years 3 months ago
Models and the locus of their truth
If models can be true, where is their truth located? Giere (e.g. 1988) has suggested an account of theoretical models on which models themselves are not truth-valued. The paper su...
Uskali Mäki
IACR
2011
212views more  IACR 2011»
12 years 8 months ago
Fully Homomorphic Encryption without Bootstrapping
We present a radically new approach to fully homomorphic encryption (FHE) that dramatically improves performance and bases security on weaker assumptions. A central conceptual con...
Zvika Brakerski, Craig Gentry, Vinod Vaikuntanatha...
CVPR
2011
IEEE
13 years 4 months ago
Modeling Human Activities as Speech
Human activity recognition and speech recognition appear to be two loosely related research areas. However, on a careful thought, there are several analogies between activity and ...
Chia-Chih Chen, Jake Aggarwal