Sciweavers

7225 search results - page 1221 / 1445
» On the Computational Power of Biochemistry
Sort
View
103
Voted
TIT
1998
70views more  TIT 1998»
15 years 1 months ago
The Poisson Multiple-Access Channel
—The Poisson multiple-access channel (MAC) models many-to-one optical communication through an optical fiber or in free space. For this model we compute the capacity region for ...
Amos Lapidoth, Shlomo Shamai
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 1 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
ML
2007
ACM
104views Machine Learning» more  ML 2007»
15 years 1 months ago
A general criterion and an algorithmic framework for learning in multi-agent systems
We offer a new formal criterion for agent-centric learning in multi-agent systems, that is, learning that maximizes one’s rewards in the presence of other agents who might also...
Rob Powers, Yoav Shoham, Thuc Vu
100
Voted
NETWORK
2007
100views more  NETWORK 2007»
15 years 1 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...
PR
2007
127views more  PR 2007»
15 years 1 months ago
Face recognition using spectral features
Face recognition is a challenging task in computer vision and pattern recognition. It is well-known that obtaining a low-dimensional feature representation with enhanced discrimin...
Fei Wang, Jingdong Wang, Changshui Zhang, James T....
« Prev « First page 1221 / 1445 Last » Next »