Sciweavers

5995 search results - page 1112 / 1199
» Algorithmic Game Theory
Sort
View
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
15 years 7 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
MOBIHOC
2004
ACM
15 years 7 months ago
On the behavior of communication links of a node in a multi-hop mobile environment
In this work, we develop an analytical framework to investigate the behavior of the communication links of a node in a random mobility environment. Analytical expressions characte...
Prince Samar, Stephen B. Wicker
134
Voted
SIGIR
2004
ACM
15 years 7 months ago
A nonparametric hierarchical bayesian framework for information filtering
Information filtering has made considerable progress in recent years.The predominant approaches are content-based methods and collaborative methods. Researchers have largely conc...
Kai Yu, Volker Tresp, Shipeng Yu
APPROX
2004
Springer
121views Algorithms» more  APPROX 2004»
15 years 7 months ago
Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption
A quantum encryption scheme (also called private quantum channel, or state randomization protocol) is a one-time pad for quantum messages. If two parties share a classical random s...
Andris Ambainis, Adam Smith
KDD
2004
ACM
147views Data Mining» more  KDD 2004»
15 years 7 months ago
Clustering time series from ARMA models with clipped data
Clustering time series is a problem that has applications in a wide variety of fields, and has recently attracted a large amount of research. In this paper we focus on clustering...
Anthony J. Bagnall, Gareth J. Janacek
« Prev « First page 1112 / 1199 Last » Next »