Sciweavers

679 search results - page 107 / 136
» hybrid 2010
Sort
View
WCNC
2010
IEEE
14 years 1 months ago
Prioritized Resource Sharing in WiMax and WiFi Integrated Networks
Abstract—In order to ensure fair access and efficiency of bandwidth usage in wireless integrated networks, resource allocation algorithms should be well designed. In this paper,...
Nirmal Andrews, Yogesh Reddy Kondareddy, Prathima ...
SIGGRAPH
2010
ACM
14 years 1 months ago
A deformation transformer for real-time cloth animation
Achieving interactive performance in cloth animation has significant implications in computer games and other interactive graphics applications. Although much progress has been m...
Wei-Wen Feng, Yizhou Yu, Byung-Uck Kim
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
14 years 1 months ago
The baldwin effect in developing neural networks
The Baldwin Effect is a very plausible, but unproven, biological theory concerning the power of learning to accelerate evolution. Simple computational models in the 1980’s gave...
Keith L. Downing
EDBT
2010
ACM
135views Database» more  EDBT 2010»
14 years 1 months ago
Probabilistic ranking over relations
Probabilistic top-k ranking queries have been extensively studied due to the fact that data obtained can be uncertain in many real applications. A probabilistic top-k ranking quer...
Lijun Chang, Jeffrey Xu Yu, Lu Qin, Xuemin Lin
ACISP
2010
Springer
13 years 11 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...