Sciweavers

12257 search results - page 2303 / 2452
» Analysis of Algorithms
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 10 months ago
A Complexity View of Markets with Social Influence
: In this paper, inspired by the work of Megiddo on the formation of preferences and strategic analysis, we consider an early market model studied in the field of economic theory, ...
Xi Chen, Shang-Hua Teng
SIAMREV
2010
174views more  SIAMREV 2010»
14 years 10 months ago
Guaranteed Minimum-Rank Solutions of Linear Matrix Equations via Nuclear Norm Minimization
The affine rank minimization problem consists of finding a matrix of minimum rank that satisfies a given system of linear equality constraints. Such problems have appeared in the ...
Benjamin Recht, Maryam Fazel, Pablo A. Parrilo
TMC
2010
86views more  TMC 2010»
14 years 10 months ago
Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations
Although the EDCA access mechanism of the 802.11e standard supports legacy DCF stations, the presence of DCF stations in the WLAN jeopardizes the provisioning of the service guaran...
Albert Banchs, Pablo Serrano, Luca Vollero
TMI
2010
208views more  TMI 2010»
14 years 10 months ago
Patient-Specific Modeling and Quantification of the Aortic and Mitral Valves From 4-D Cardiac CT and TEE
As decisions in cardiology increasingly rely on non-invasive methods, fast and precise image processing tools have become a crucial component of the analysis workflow. To the best ...
Razvan Ioan Ionasec, Ingmar Voigt, Bogdan Georgesc...
ACSAC
2010
IEEE
14 years 7 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
« Prev « First page 2303 / 2452 Last » Next »