Sciweavers

169 search results - page 20 / 34
» A weakly stable algorithm for general Toeplitz systems
Sort
View
ATAL
2010
Springer
14 years 10 months ago
Honor among thieves: collusion in multi-unit auctions
We consider collusion in multi-unit auctions where the allocation and payments are determined using the VCG mechanism. We show how collusion can increase the utility of the collud...
Yoram Bachrach
70
Voted
FSE
2005
Springer
116views Cryptology» more  FSE 2005»
15 years 3 months ago
Narrow T-Functions
T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building ...
Magnus Daum
CIKM
2009
Springer
15 years 4 months ago
Exploiting bidirectional links: making spamming detection easier
Previous anti-spamming algorithms based on link structure suffer from either the weakness of the page value metric or the vagueness of the seed selection. In this paper, we propos...
Yan Zhang, Qiancheng Jiang, Lei Zhang, Yizhen Zhu
78
Voted
SIGCOMM
2006
ACM
15 years 3 months ago
Policy-based routing with non-strict preferences
Traditional studies of routing problems often assumed strict preferences on paths, by eliminating ambiguity in path comparisons, or imposing a priori deterministic tie-breaking. S...
Chi-kin Chau
3DPVT
2004
IEEE
316views Visualization» more  3DPVT 2004»
15 years 1 months ago
A Statistical Method for Robust 3D Surface Reconstruction from Sparse Data
Abstract-General information about a class of objects, such as human faces or teeth, can help to solve the otherwise ill-posed problem of reconstructing a complete surface from spa...
Volker Blanz, Albert Mehl, Thomas Vetter, Hans-Pet...