Sciweavers

15782 search results - page 3070 / 3157
» Network Optimization and Control
Sort
View
GLOBECOM
2009
IEEE
15 years 6 months ago
Conjectural Equilibrium in Water-Filling Games
—This paper considers a non-cooperative game in which competing users sharing a frequency-selective interference channel selfishly optimize their power allocation in order to imp...
Yi Su, Mihaela van der Schaar
113
Voted
SIGGRAPH
2010
ACM
15 years 6 months ago
Camouflage images
Camouflage images contain one or more hidden figures that remain imperceptible or unnoticed for a while. In one possible explanation, the ability to delay the perception of the hi...
Hung-Kuo Chu, Wei-Hsin Hsu, Niloy J. Mitra, Daniel...
CCS
2008
ACM
15 years 5 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
ASPLOS
2006
ACM
15 years 5 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
CRV
2005
IEEE
342views Robotics» more  CRV 2005»
15 years 5 months ago
PDE-Based Robust Robotic Navigation
In robotic navigation, path planning is aimed at getting the optimum collision-free path between a starting and target locations. The optimality criterion depends on the surroundi...
M. Sabry Hassouna, Alaa E. Abdel-Hakim, Aly A. Far...
« Prev « First page 3070 / 3157 Last » Next »