Sciweavers

4908 search results - page 903 / 982
» On the Complexity of Optimal K-Anonymity
Sort
View
96
Voted
JETAI
2007
131views more  JETAI 2007»
14 years 11 months ago
A computational architecture for heterogeneous reasoning
Reasoning, problem solving, indeed the general process of acquiring knowledge, is not an isolated, homogenous affair involving a one agent using a single form of representation, b...
Dave Barker-Plummer, John Etchemendy
TSP
2008
87views more  TSP 2008»
14 years 11 months ago
Interference Suppression for Memoryless Nonlinear Multiuser Systems Using Constellation Structure
A generalized concept of interference suppression is introduced for multiuser systems with a known memoryless transmit non-linearity, such as in the downlink amplifier of a satelli...
Ananya Sen Gupta, Andrew Singer
TWC
2008
140views more  TWC 2008»
14 years 11 months ago
Exclusive-Region Based Scheduling Algorithms for UWB WPAN
With the capability of supporting very high data rate services in a short range, Ultra-Wideband (UWB) technology is appealing to multimedia applications in future wireless personal...
Kuang-Hao Liu, Lin Cai, Xuemin Shen
BMCBI
2002
100views more  BMCBI 2002»
14 years 11 months ago
An algorithm and program for finding sequence specific oligo-nucleotide probes for species identification
Background: The identification of species or species groups with specific oligo-nucleotides as molecular signatures is becoming increasingly popular for bacterial samples. However...
Alexander E. Pozhitkov, Diethard Tautz
CCR
2002
86views more  CCR 2002»
14 years 11 months ago
Hop-by-hop routing algorithms for premium traffic
In Differentiated Service (DiffServ) networks, the routing algorithms used by the premium class traffic, due to the high priority afforded to that traffic, may have a significant ...
Jun Wang, Klara Nahrstedt