Sciweavers

3898 search results - page 431 / 780
» On the Bit Extraction Problem
Sort
View
161
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Measurement and Diagnosis of Address Misconfigured P2P Traffic
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and stu...
Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzma...
CORR
2011
Springer
210views Education» more  CORR 2011»
14 years 8 months ago
Transmission with Energy Harvesting Nodes in Fading Wireless Channels: Optimal Policies
Wireless systems comprised of rechargeable nodes have a significantly prolonged lifetime and are sustainable. A distinct characteristic of these systems is the fact that the node...
Omur Ozel, Kaya Tutuncuoglu, Jing Yang, Sennur Ulu...
174
Voted
SIGECOM
2011
ACM
203views ECommerce» more  SIGECOM 2011»
14 years 7 months ago
Polynomial-time computation of exact correlated equilibrium in compact games
In a landmark paper, Papadimitriou and Roughgarden [2008] described a polynomial-time algorithm (“Ellipsoid Against Hope”) for computing sample correlated equilibria of concis...
Albert Xin Jiang, Kevin Leyton-Brown
CVPR
2012
IEEE
13 years 7 months ago
Leveraging category-level labels for instance-level image retrieval
In this article, we focus on the problem of large-scale instance-level image retrieval. For efficiency reasons, it is common to represent an image by a fixed-length descriptor w...
Albert Gordo, José A. Rodríguez-Serr...
RSCTC
2000
Springer
197views Fuzzy Logic» more  RSCTC 2000»
15 years 8 months ago
Rough Set Approach to CBR
We discuss how Case Based Reasoning (CBR) (see e.g. [1], [4]) philosophy of adaptation of some known situations to new similar ones can be realized in rough set framework [5] for c...
Jan Wierzbicki