Sciweavers

897 search results - page 138 / 180
» Identity: How to name it, How to find it
Sort
View
PE
2002
Springer
150views Optimization» more  PE 2002»
15 years 1 months ago
Delimiting the range of effectiveness of scalable on-demand streaming
Previous analyses of scalable streaming protocols for delivery of stored multimedia have largely focused on how the server bandwidth required for full-file delivery scales as the ...
Haonan Tan, Derek L. Eager, Mary K. Vernon
153
Voted
SIAMREV
2010
174views more  SIAMREV 2010»
14 years 8 months ago
Guaranteed Minimum-Rank Solutions of Linear Matrix Equations via Nuclear Norm Minimization
The affine rank minimization problem consists of finding a matrix of minimum rank that satisfies a given system of linear equality constraints. Such problems have appeared in the ...
Benjamin Recht, Maryam Fazel, Pablo A. Parrilo
TSMC
2010
14 years 8 months ago
A Model for the Integration of Prioritized Knowledge Bases Through Subjective Belief Games
Belief merging is concerned with the integration of several belief bases such that a coherent belief base is developed. Various belief merging models have been developed that use a...
Ebrahim Bagheri, Ali A. Ghorbani
JAR
2000
145views more  JAR 2000»
15 years 1 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
ICDCS
2009
IEEE
14 years 11 months ago
A Case Study of Traffic Locality in Internet P2P Live Streaming Systems
With the ever-increasing P2P Internet traffic, recently much attention has been paid to the topology mismatch between the P2P overlay and the underlying network due to the large a...
Yao Liu, Lei Guo, Fei Li, Songqing Chen