Sciweavers

5153 search results - page 819 / 1031
» Introduction to Randomized Algorithms
Sort
View
ICIP
2008
IEEE
15 years 9 months ago
Generalized ELL for detecting and tracking through illumination model changes
In previous work, we developed the Illum-PF-MT, which is the PFMT idea applied to the problem of tracking temporally and spatially varying illumination change. In many practical p...
Amit Kale, Namrata Vaswani
123
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
Beamforming with Limited Feedback in Amplify-and-Forward Cooperative Networks
— A relay selection approach has previously been shown to outperform repetition-based scheduling for both amplify-and-forward (AF) and decode-and-forward (DF) cooperative network...
Yi Zhao, Raviraj Adve, Teng Joon Lim
148
Voted
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 9 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
126
Voted
CIKM
2007
Springer
15 years 9 months ago
Extending query translation to cross-language query expansion with markov chain models
Dictionary-based approaches to query translation have been widely used in Cross-Language Information Retrieval (CLIR) experiments. Using these approaches, translation has been not...
Guihong Cao, Jianfeng Gao, Jian-Yun Nie, Jing Bai
COCO
2007
Springer
88views Algorithms» more  COCO 2007»
15 years 9 months ago
A New Interactive Hashing Theorem
Interactive hashing, introduced by Naor, Ostrovsky, Venkatesan and Yung (CRYPTO ’92), plays an important role in many cryptographic protocols. In particular, it is a major compo...
Iftach Haitner, Omer Reingold