Sciweavers

8431 search results - page 1613 / 1687
» Algorithmically Independent Sequences
Sort
View
TLCA
2005
Springer
15 years 3 months ago
Privacy in Data Mining Using Formal Methods
There is growing public concern about personal data collected by both private and public sectors. People have very little control over what kinds of data are stored and how such da...
Stan Matwin, Amy P. Felty, István T. Hern&a...
WINE
2005
Springer
146views Economy» more  WINE 2005»
15 years 3 months ago
A Cost Mechanism for Fair Pricing of Resource Usage
We propose a simple and intuitive cost mechanism which assigns costs for the competitive usage of m resources by n selfish agents. Each agent has an individual demand; demands are...
Marios Mavronicolas, Panagiota N. Panagopoulou, Pa...
WINE
2005
Springer
179views Economy» more  WINE 2005»
15 years 3 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
APGV
2004
ACM
164views Visualization» more  APGV 2004»
15 years 3 months ago
Subband encoding of high dynamic range imagery
The transition from traditional 24-bit RGB to high dynamic range (HDR) images is hindered by excessively large file formats with no backwards compatibility. In this paper, we prop...
Greg Ward, Maryann Simmons
CASES
2004
ACM
15 years 3 months ago
A hamming distance based VLIW/EPIC code compression technique
This paper presents and reports on a VLIW code compression technique based on vector Hamming distances [19]. It investigates the appropriate selection of dictionary vectors such t...
Montserrat Ros, Peter Sutton
« Prev « First page 1613 / 1687 Last » Next »