Sciweavers

2714 search results - page 508 / 543
» Approximation Schemes for Scheduling
Sort
View
FOCS
2006
IEEE
15 years 6 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...
104
Voted
IJCNN
2006
IEEE
15 years 6 months ago
Greedy forward selection algorithms to Sparse Gaussian Process Regression
Abstract— This paper considers the basis vector selection issue invloved in forward selection algorithms to sparse Gaussian Process Regression (GPR). Firstly, we re-examine a pre...
Ping Sun, Xin Yao
SIGGRAPH
2010
ACM
15 years 5 months ago
Interactive hair rendering under environment lighting
We present an algorithm for interactive hair rendering with both single and multiple scattering effects under complex environment lighting. The outgoing radiance due to single sca...
Zhong Ren, Kun Zhou, Tengfei Li, Wei Hua, Baining ...
103
Voted
CDC
2009
IEEE
170views Control Systems» more  CDC 2009»
15 years 3 months ago
Integrated direct/indirect adaptive robust control of a class of nonlinear systems preceded by unknown dead-zone nonlinearity
— This paper presents an integrated direct/indirect adaptive robust control (DIARC) scheme for a class of nonlinear systems preceded by unknown non-symmetric, non-equal slope dea...
Chuxiong Hu, Bin Yao, Qingfeng Wang
CIKM
2008
Springer
15 years 2 months ago
Efficient sampling of information in social networks
As online social networking emerges, there has been increased interest to utilize the underlying social structure as well as the available social information to improve search. In...
Gautam Das, Nick Koudas, Manos Papagelis, Sushruth...