Sciweavers

7379 search results - page 1088 / 1476
» How Many Clusters
Sort
View
DIALM
2000
ACM
112views Algorithms» more  DIALM 2000»
15 years 9 months ago
A decision-theoretic approach to resource allocation in wireless multimedia networks
The allocation of scarce spectral resources to support as many user applications as possible while maintaining reasonable quality of service is a fundamental problem in wireless c...
Zygmunt J. Haas, Joseph Y. Halpern, Erran L. Li, S...
MM
2000
ACM
166views Multimedia» more  MM 2000»
15 years 9 months ago
Automatically extracting highlights for TV Baseball programs
In today’s fast-paced world, while the number of channels of television programming available is increasing rapidly, the time available to watch them remains the same or is decr...
Yong Rui, Anoop Gupta, Alex Acero
151
Voted
MOBIHOC
2000
ACM
15 years 9 months ago
Role-based multicast in highly mobile but sparsely connected ad hoc networks
— We present an approach to multicasting messages among highly mobile hosts in ad hoc networks. We suggest a new definition of a role-based multicast that suits the special need...
Linda Briesemeister, Günter Hommel
AGENTS
2000
Springer
15 years 9 months ago
Ant-like missionaries and cannibals: synthetic pheromones for distributed motion control
Many applied problems in domains such as military operations, manufacturing, and logistics require that entities change location under certain constraints. These problems are trad...
H. Van Dyke Parunak, Sven Brueckner
141
Voted
ASIACRYPT
2000
Springer
15 years 9 months ago
Improved Methods to Perform Threshold RSA
Abstract. A t out of n threshold scheme is such that shares are distributed to n participants so that any set of t participants can compute the secret, whereas any set of less than...
Brian King
« Prev « First page 1088 / 1476 Last » Next »