Sciweavers

603 search results - page 105 / 121
» A General Approximation Technique for Constrained Forest Pro...
Sort
View
ICMCS
2006
IEEE
111views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Optimized Rate Allocation for Unbalanced Multiple Description Video Coding Over Unreliable Packet Network
Video transmission over unreliable packet network is in general hampered by the packet losses and constraint by stringent playback deadline. With these two key factors in consider...
Bin Li, Feng Huang, Lifeng Shu, Shiqiang Yang
DAC
2006
ACM
15 years 5 months ago
A fast on-chip decoupling capacitance budgeting algorithm using macromodeling and linear programming
We propose a novel and efficient charge-based decoupling capacitance budgeting algorithm. Our method uses the macromodeling technique and effective radius of decoupling capacitan...
Min Zhao, Rajendran Panda, Savithri Sundareswaran,...
SIGECOM
2006
ACM
128views ECommerce» more  SIGECOM 2006»
15 years 5 months ago
Controlling a supply chain agent using value-based decomposition
We present and evaluate the design of Deep Maize, our entry in the 2005 Trading Agent Competition Supply Chain Management scenario. The central idea is to decompose the problem by...
Christopher Kiekintveld, Jason Miller, Patrick R. ...
CIKM
2009
Springer
15 years 3 months ago
Effective, design-independent XML keyword search
Keyword search techniques that take advantage of XML structure make it very easy for ordinary users to query XML databases, but current approaches to processing these queries rely...
Arash Termehchy, Marianne Winslett
DIM
2008
ACM
15 years 1 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel