Sciweavers

139 search results - page 28 / 28
» Cryptographic Randomized Response Techniques
Sort
View
ATAL
2011
Springer
12 years 5 months ago
A double oracle algorithm for zero-sum security games on graphs
In response to the Mumbai attacks of 2008, the Mumbai police have started to schedule a limited number of inspection checkpoints on the road network throughout the city. Algorithm...
Manish Jain, Dmytro Korzhyk, Ondrej Vanek, Vincent...
VTC
2008
IEEE
160views Communications» more  VTC 2008»
13 years 11 months ago
Reducing Feedback Requirements of the Multiple Weight Opportunistic Beamforming Scheme via Selective Multiuser Diversity
—Opportunistic beamforming (OB) relies on the transmission of Channel State Information (CSI) in the form of instantaneous Signal to Noise Ratio (SNR) from Mobile Stations (MSs) ...
Marios Nicolaou, Angela Doufexi, Simon Armour
BMCBI
2008
145views more  BMCBI 2008»
13 years 5 months ago
The contrasting properties of conservation and correlated phylogeny in protein functional residue prediction
Background: Amino acids responsible for structure, core function or specificity may be inferred from multiple protein sequence alignments where a limited set of residue types are ...
Jonathan R. Manning, Emily R. Jefferson, Geoffrey ...
MVA
2011
336views Computer Vision» more  MVA 2011»
13 years 9 days ago
In-vehicle camera traffic sign detection and recognition
: In this paper we discuss theoretical foundations and a practical realization of a real-time traffic sign detection, tracking and recognition system operating on board of a vehicl...
Andrzej Ruta, Fatih Porikli, Shintaro Watanabe, Yo...