Sciweavers

2714 search results - page 360 / 543
» Approximation Schemes for Scheduling
Sort
View
134
Voted
CVPR
2012
IEEE
13 years 6 months ago
Scalable k-NN graph construction for visual descriptors
The k-NN graph has played a central role in increasingly popular data-driven techniques for various learning and vision tasks; yet, finding an efficient and effective way to con...
Jing Wang, Jingdong Wang, Gang Zeng, Zhuowen Tu, R...
157
Voted
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
123
Voted
WOWMOM
2005
ACM
82views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
Power Control is not Required for Wireless Networks in the Linear Regime
— We consider the design of optimal strategies for joint power adaptation, rate adaptation and scheduling in a multi-hop wireless network. Most existing strategies control either...
Bozidar Radunovic, Jean-Yves Le Boudec
171
Voted
INFOCOM
1998
IEEE
15 years 8 months ago
Implementing Distributed Packet Fair Queueing in a Scalable Switch Architecture
To support the Internet's explosive growth and expansion into a true integrated services network, there is a need for cost-effective switching technologies that can simultaneo...
Donpaul C. Stephens, Hui Zhang
136
Voted
DAC
1998
ACM
15 years 8 months ago
A Tool for Performance Estimation of Networked Embedded End-systems
Networked embedded systems are expected to support adaptive streaming audio/video applications with soft real-time constraints. These systems can be designed in a cost efficient ...
Asawaree Kalavade, Pratyush Moghé