Sciweavers

666 search results - page 132 / 134
» Fair watermarking techniques
Sort
View
BC
1998
118views more  BC 1998»
14 years 9 months ago
A cross-interval spike train analysis: the correlation between spike generation and temporal integration of doublets
Abstract. A stochastic spike train analysis technique is introduced to reveal the correlation between the firing of the next spike and the temporal integration period of two conse...
David C. Tam
INFOCOM
2010
IEEE
14 years 8 months ago
Utility Maximization for Delay Constrained QoS in Wireless
Abstract—This paper studies the problem of utility maximization for clients with delay based QoS requirements in wireless networks. We adopt a model used in a previous work that ...
I-Hong Hou, P. R. Kumar
INFOCOM
2010
IEEE
14 years 8 months ago
Optimal SINR-based Random Access
— Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not a...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong, Robe...
IMC
2010
ACM
14 years 7 months ago
CloudCmp: comparing public cloud providers
While many public cloud providers offer pay-as-you-go computing, their varying approaches to infrastructure, virtualization, and software services lead to a problem of plenty. To ...
Ang Li, Xiaowei Yang, Srikanth Kandula, Ming Zhang
WINE
2010
Springer
164views Economy» more  WINE 2010»
14 years 7 months ago
Incentives in Online Auctions via Linear Programming
Online auctions in which items are sold in an online fashion with little knowledge about future bids are common in the internet environment. We study here a problem in which an auc...
Niv Buchbinder, Kamal Jain, Mohit Singh