Sciweavers

1419 search results - page 278 / 284
» A Characterization of Constructive Dimension
Sort
View
CN
2006
79views more  CN 2006»
14 years 10 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
84
Voted
FSS
2006
140views more  FSS 2006»
14 years 10 months ago
Advances and challenges in interval-valued fuzzy logic
Among the various extensions to the common [0, 1]-valued truth degrees of "traditional" fuzzy set theory, closed intervals of [0, 1] stand out as a particularly appealin...
Chris Cornelis, Glad Deschrijver, Etienne E. Kerre
CORR
2007
Springer
97views Education» more  CORR 2007»
14 years 10 months ago
Side-information Scalable Source Coding
Abstract—We consider the problem of side-information scalable (SI-scalable) source coding, where the encoder constructs a two-layer description, such that the receiver with high ...
Chao Tian, Suhas N. Diggavi
JSAC
2008
101views more  JSAC 2008»
14 years 10 months ago
Sequential Bandwidth and Power Auctions for Distributed Spectrum Sharing
We study a sequential auction for sharing a wireless resource (bandwidth or power) among competing transmitters. The resource is assumed to be managed by a spectrum broker (auction...
Junjik Bae, Eyal Beigman, Randall A. Berry, Michae...
EJC
2007
14 years 10 months ago
Quickly deciding minor-closed parameters in general graphs
We construct algorithms for deciding essentially any minor-closed parameter, with explicit time bounds. This result strengthens previous results by Robertson and Seymour [1,2], Fr...
Erik D. Demaine, Mohammad Taghi Hajiaghayi