Sciweavers

TIP
2010
107views more  TIP 2010»
13 years 7 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
SIAMDM
2010
131views more  SIAMDM 2010»
13 years 7 months ago
On Optimal Strategies for a Hat Game on Graphs
The following problem was introduced by Marcin Krzywkowski as a generalization of a problem of Todd Ebert. After initially coordinating a strategy, n players each occupy a differe...
Uriel Feige
EJWCN
2010
94views more  EJWCN 2010»
13 years 7 months ago
Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application
Information collection in the disaster area is an important application of pigeon networks - a special type of delay tolerant networks (DTN) that borrows the ancient idea of using ...
Jiazhen Zhou, Jiang Li, Legand L. Burge III
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 7 months ago
A recombination algorithm for the decomposition of multivariate rational functions
In this paper we show how we can compute in a deterministic way the decomposition of a multivariate rational function with a recombination strategy. The key point of our recombinat...
Guillaume Chèze
IJSDS
2010
162views more  IJSDS 2010»
13 years 9 months ago
Strategy as Action: From Porter to Anti-Porter
: In the post-crisis era new concepts are emerging, while some old and dysfunctional ones are being discarded. Strategy is about making series of decisions that drive corporate act...
Milan Zeleny
ICPR
2010
IEEE
13 years 10 months ago
Resampling Approach to Facial Expression Recognition Using 3D Meshes
We propose a novel strategy, based on resampling of 3D meshes, to recognize facial expressions. This entails conversion of the existing irregular 3D mesh structure in the database ...
Y. V. Venkatesh, Ashraf A. Kassim, O. V. Ramana Mu...
ANTSW
2010
Springer
13 years 10 months ago
Autonomous Multi-agent Cycle Based Patrolling
We introduce a novel multi-agent patrolling strategy. By assumption, the swarm of agents performing the task consists of very low capability ant-like agents. The agents have littl...
Yotam Elor, Alfred M. Bruckstein
ADAEUROPE
2010
Springer
13 years 10 months ago
Scheduling Configuration of Real-Time Component-Based Applications
Abstract: This paper proposes a strategy to manage the schedulability of realtime component-based applications that is fully compatible with the concept of component viewed as a re...
Patricia López Martínez, Laura Barro...
TMC
2010
151views more  TMC 2010»
13 years 11 months ago
Access Strategies for Spectrum Sharing in Fading Environment: Overlay, Underlay, and Mixed
—In this paper, we analyze the achievable capacity of the secondary service for overlay and underlay access strategies. We then propose a novel mixed access strategy in which in ...
Mohammad G. Khoshkholgh, Keivan Navaie, Halim Yani...
PPOPP
2010
ACM
13 years 11 months ago
Analyzing lock contention in multithreaded applications
Many programs exploit shared-memory parallelism using multithreading. Threaded codes typically use locks to coordinate access to shared data. In many cases, contention for locks r...
Nathan R. Tallent, John M. Mellor-Crummey, Allan P...