Sciweavers

4679 search results - page 794 / 936
» Modeling When Connections Are the Problem
Sort
View
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 5 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
101
Voted
ATAL
2008
Springer
15 years 3 months ago
Resource limitations, transmission costs and critical thresholds in scale-free networks
Whether or not a critical threshold exists when epidemic diseases are spread in complex networks is a problem attracting attention from researchers in several disciplines. In 2001...
Chung-Yuan Huang, Chuen-Tsai Sun, Chia-Ying Cheng,...
IJVR
2006
199views more  IJVR 2006»
15 years 1 months ago
Interactive Virtual Humans in Real-Time Virtual Environments
In this paper, we will present an overview of existing research in the vast area of IVH systems. We will also present our ongoing work on improving the expressive capabilities of I...
Nadia Magnenat-Thalmann, Arjan Egges
135
Voted
JMLR
2006
85views more  JMLR 2006»
15 years 1 months ago
Streamwise Feature Selection
In streamwise feature selection, new features are sequentially considered for addition to a predictive model. When the space of potential features is large, streamwise feature sel...
Jing Zhou, Dean P. Foster, Robert A. Stine, Lyle H...
116
Voted
JSAC
2006
124views more  JSAC 2006»
15 years 1 months ago
A game-theoretic approach to energy-efficient power control in multicarrier CDMA systems
A game-theoretic model for studying power control in multicarrier code-division multiple-access systems is proposed. Power control is modeled as a noncooperative game in which each...
Farhad Meshkati, Mung Chiang, H. Vincent Poor, Stu...