Sciweavers

5244 search results - page 4 / 1049
» When are two algorithms the same
Sort
View
ICICS
2007
Springer
13 years 9 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
DCOSS
2007
Springer
13 years 12 months ago
Optimal Cluster Association in Two-Tiered Wireless Sensor Networks
Abstract. In this paper, we study the two-tiered wireless sensor network (WSN) architecture and propose the optimal cluster association algorithm for it to maximize the overall net...
Weizhao Wang, Wen-Zhan Song, Xiang-Yang Li, Kousha...
CHI
2003
ACM
14 years 6 months ago
Who wants to know what when? privacy preference determinants in ubiquitous computing
We conducted a questionnaire-based study of the relative importance of two factors, inquirer and situation, in determining the preferred accuracy of personal information disclosed...
Scott Lederer, Jennifer Mankoff, Anind K. Dey
ICIP
1997
IEEE
14 years 7 months ago
Two-Dimensional Blind Deconvolution Using a Robust GCD Approach
In this paper we examine the applicability of the previously proposed Greatest Common Divisor (GCD) method to blind image deconvolution. In this method, the desired image is appro...
S. U. Pillai, B. Liang
BC
2005
77views more  BC 2005»
13 years 5 months ago
Motion repulsion arises from stimulus statistics when analyzed with a clustering algorithm
Motion repulsion is the perceived enlargement of the angle between the directions of motion of two transparently moving patterns. An explanation of this illusion has long been soug...
Alireza S. Mahani, Anders E. Carlsson, Ralf Wessel