Sciweavers

347 search results - page 46 / 70
» Fast Analysis and Optimization of Power Ground Networks
Sort
View
TIP
2010
107views more  TIP 2010»
14 years 4 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
CORR
2008
Springer
89views Education» more  CORR 2008»
14 years 9 months ago
Information Theoretic Operating Regimes of Large Wireless Networks
In analyzing the point-to-point wireless channel, insights about two qualitatively different operating regimes-bandwidth- and power-limited--have proven indispensable in the design...
Ayfer Özgür, Ramesh Johari, David N. C. ...
95
Voted
TWC
2008
142views more  TWC 2008»
14 years 9 months ago
Cooperative Diversity in Interference Limited Wireless Networks
Using relays in wireless networks can potentially lead to significant capacity increases. However, within an asynchronous multi-user communication setting, relaying might cause mor...
Sam Vakil, Ben Liang
ICPR
2004
IEEE
15 years 10 months ago
Gaussian Energy Functions for Registration without Correspondences
A new criterion based on Gaussian fields is introduced and applied to the task of automatic rigid registration of point-sets. The method defines a simple energy function, which is...
Andreas Koschan, Besma R. Abidi, Faysal Boughorbel...
84
Voted
MINENET
2006
ACM
15 years 3 months ago
SVM learning of IP address structure for latency prediction
We examine the ability to exploit the hierarchical structure of Internet addresses in order to endow network agents with predictive capabilities. Specifically, we consider Suppor...
Robert Beverly, Karen R. Sollins, Arthur Berger