Sciweavers

1265 search results - page 252 / 253
» Finding the Key to a Synapse
Sort
View
TIP
2010
107views more  TIP 2010»
13 years 1 days ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
TIT
2010
163views Education» more  TIT 2010»
13 years 1 days ago
Power-controlled feedback and training for two-way MIMO channels
Most communication systems use some form of feedback, often related to channel state information. The common models used in analyses either assume perfect channel state information...
Vaneet Aggarwal, Ashutosh Sabharwal
TSMC
2010
13 years 15 hour ago
A Model for the Integration of Prioritized Knowledge Bases Through Subjective Belief Games
Belief merging is concerned with the integration of several belief bases such that a coherent belief base is developed. Various belief merging models have been developed that use a...
Ebrahim Bagheri, Ali A. Ghorbani
BMCBI
2011
12 years 9 months ago
Reconstructing genome-wide regulatory network of E. coli using transcriptome data and predicted transcription factor activities
Background: Gene regulatory networks play essential roles in living organisms to control growth, keep internal metabolism running and respond to external environmental changes. Un...
Yao Fu, Laura R. Jarboe, Julie A. Dickerson
CHI
2011
ACM
12 years 9 months ago
Designing a phone broadcasting system for urban sex workers in India
In this paper, we present the design, implementation, and deployment of a phone-based broadcasting system designed for reaching out to at-risk populations in urban India. We worke...
Nithya Sambasivan, Julie Weber, Edward Cutrell