Sciweavers

3229 search results - page 547 / 646
» Mixing
Sort
View
160
Voted
ACCESSNETS
2009
Springer
14 years 10 months ago
Capacity of Two-Way Relay Channel
This paper investigates the capacity of a wireless two-way relay channel in which two end nodes exchange information via a relay node. The capacity is defined in the information-th...
Shengli Zhang, Soung Chang Liew, Hui Wang, Xiao-Hu...
128
Voted
CIKM
2009
Springer
14 years 10 months ago
Interactive relevance feedback with graded relevance and sentence extraction: simulated user experiments
Research on relevance feedback (RFB) in information retrieval (IR) has given mixed results. Success in RFB seems to depend on the searcher's willingness to provide feedback a...
Kalervo Järvelin
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 10 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
113
Voted
FIW
2009
120views Communications» more  FIW 2009»
14 years 10 months ago
Software Security Vulnerabilities Seen As Feature Interactions
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
Guy-Vincent Jourdan
90
Voted
GD
2009
Springer
14 years 10 months ago
Algebraic Methods for Counting Euclidean Embeddings of Rigid Graphs
Abstract. The study of (minimally) rigid graphs is motivated by numerous applications, mostly in robotics and bioinformatics. A major open problem concerns the number of embeddings...
Ioannis Z. Emiris, Elias P. Tsigaridas, Antonios V...