Sciweavers

319 search results - page 61 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
WSDM
2010
ACM
160views Data Mining» more  WSDM 2010»
15 years 7 months ago
Learning Concept Importance Using a Weighted Dependence Model
Modeling query concepts through term dependencies has been shown to have a significant positive effect on retrieval performance, especially for tasks such as web search, where rel...
Michael Bendersky, Donald Metzler, W. Bruce Croft
APPROX
2009
Springer
85views Algorithms» more  APPROX 2009»
15 years 4 months ago
Pseudorandom Generators and Typically-Correct Derandomization
The area of derandomization attempts to provide efficient deterministic simulations of randomized algorithms in various algorithmic settings. Goldreich and Wigderson introduced a n...
Jeff Kinne, Dieter van Melkebeek, Ronen Shaltiel
BROADNETS
2007
IEEE
15 years 4 months ago
Cross-layer optimization made practical
Abstract— Limited resources and time-varying nature of wireless ad hoc networks demand optimized use of resources across layers. Cross-layer optimization (CLO) for wireless netwo...
Ajit Warrier, Long Le, Injong Rhee
70
Voted
INFOCOM
2007
IEEE
15 years 3 months ago
Rate-Adaptive Framing for Interfered Wireless Networks
The majority of existing wireless rate controls are based on the implicit assumption that frames are corrupted due to the random, arbitrary environmental and thermal noises. They ...
Chun-cheng Chen, Haiyun Luo, Eunsoo Seo, Nitin H. ...
3DPVT
2006
IEEE
190views Visualization» more  3DPVT 2006»
15 years 3 months ago
3D City Modeling Using Cognitive Loops
3D city modeling using computer vision is very challenging. A typical city contains objects which are a nightmare for some vision algorithms, while other algorithms have been desi...
Nico Cornelis, Bastian Leibe, Kurt Cornelis, Luc J...