Sciweavers

44651 search results - page 8897 / 8931
» A Generalization of the Least General Generalization
Sort
View
INFOCOM
2012
IEEE
13 years 9 days ago
Fair background data transfers of minimal delay impact
—In this paper we present a methodology for the design of congestion control protocols for background data transfers that have a minimal delay impact on short TCP transfers and c...
Costas Courcoubetis, Antonis Dimakis
INFOCOM
2012
IEEE
13 years 9 days ago
Combinatorial auction with time-frequency flexibility in cognitive radio networks
—In this paper, we tackle the spectrum allocation problem in cognitive radio (CR) networks with time-frequency flexibility consideration using combinatorial auction. Different f...
Mo Dong, Gaofei Sun, Xinbing Wang, Qian Zhang
INFOCOM
2012
IEEE
13 years 9 days ago
Estimating age privacy leakage in online social networks
—It is well known that Online Social Networks (OSNs) are vulnerable to privacy leakages, whereby specific information about a user (political affiliation, sexual orientation, g...
Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena
TOG
2012
266views Communications» more  TOG 2012»
13 years 9 days ago
Structure-aware synthesis for predictive woven fabric appearance
Woven fabrics have a wide range of appearance determined by their small-scale 3D structure. Accurately modeling this structural detail can produce highly realistic renderings of f...
Shuang Zhao, Wenzel Jakob, Steve Marschner, Kavita...
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 9 days ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
« Prev « First page 8897 / 8931 Last » Next »