Sciweavers

2184 search results - page 338 / 437
» Modeling and Realizing Interoperability
Sort
View
144
Voted
DSS
2008
123views more  DSS 2008»
15 years 3 months ago
Delayed multiattribute product differentiation
We develop a two-stage model for versioning products with respect to both vertical and horizontal attributes. At first, a firm positions its top-quality "flagship" produ...
Thomas A. Weber
138
Voted
JSAC
2008
111views more  JSAC 2008»
15 years 3 months ago
The end-to-end rate control in multiple-hop wireless networks: Cross-layer formulation and optimal allocation
In this paper, we study the theoretical problem of the end-to-end rate assignment for multi-hop wireless networks. Specifically, we consider the problem of joint congestion control...
Chengnian Long, Bo Li, Qian Zhang, Bin Zhao, Bo Ya...
124
Voted
BC
2005
101views more  BC 2005»
15 years 3 months ago
A control theory approach to the analysis and synthesis of the experimentally observed motion primitives
Recent experiments on frogs and rats, have led to the hypothesis that sensory-motor systems are organized into a finite number of linearly combinable modules; each module generates...
Francesco Nori, Ruggero Frezza
190
Voted
SIAMMAX
2010
164views more  SIAMMAX 2010»
14 years 10 months ago
Uniqueness of Low-Rank Matrix Completion by Rigidity Theory
The problem of completing a low-rank matrix from a subset of its entries is often encountered in the analysis of incomplete data sets exhibiting an underlying factor model with app...
Amit Singer, Mihai Cucuringu
145
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai