Sciweavers

264 search results - page 30 / 53
» Numerical Verification of Optimality Conditions
Sort
View
INFOCOM
2006
IEEE
15 years 5 months ago
Utility-Optimal Medium Access Control: Reverse and Forward Engineering
— This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc networks through the network utility maximization (NUM) framework. We first reverse-e...
Jang-Won Lee, Mung Chiang, A. Robert Calderbank
EOR
2007
101views more  EOR 2007»
14 years 11 months ago
Optimizing an objective function under a bivariate probability model
The motivation of this paper is to obtain an analytical closed form of a quadratic objective function arising from a stochastic decision process with bivariate exponential probabi...
Xavier Brusset, Nico M. Temme
ECOOPW
2006
Springer
15 years 3 months ago
Program Analysis for Security and Privacy
Abstract. Software security has become more important than ever. Unfortunately, still now, the security of a software system is almost always retrofitted to an afterthought. When s...
Marco Pistoia, Francesco Logozzo
ICIP
1998
IEEE
16 years 1 months ago
A Neural Network based Scheme for Unsupervised Video Object Segmentation
In this paper, we proposed a neural network based scheme for performing unsupervised video object segmentation, especially for videophone or videoconferencing applications. The pr...
Anastasios D. Doulamis, Nikolaos D. Doulamis, Stef...
ICPR
2010
IEEE
15 years 2 months ago
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values?
In the biometric verification, authentication is given when a distance of biometric signatures between enrollment and test phases is less than an acceptance threshold, and the perf...
Yasushi Makihara, Md. Altab Hossain, Yasushi Yagi