Sciweavers

738 search results - page 103 / 148
» Prime Implicant Computation Using Satisfiability Algorithms
Sort
View
TIT
1998
134views more  TIT 1998»
14 years 9 months ago
Adaptive Blind Source Separation and Equalization for Multiple-Input/Multiple-Output Systems
—In this paper, we investigate adaptive blind source separation and equalization for multiple-input/multiple-output (MIMO) systems. We first analyze the convergence of the const...
Ye (Geoffrey) Li, K. J. Ray Liu
WWW
2011
ACM
14 years 4 months ago
Limiting the spread of misinformation in social networks
In this work, we study the notion of competing campaigns in a social network. By modeling the spread of influence in the presence of competing campaigns, we provide necessary too...
Ceren Budak, Divyakant Agrawal, Amr El Abbadi
CCS
2009
ACM
15 years 4 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 3 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
CVPR
1998
IEEE
15 years 11 months ago
Interactive Sensor Planning
This paper describes an interactive sensor planning system that can be used to select viewpoints subject to camera visibility, field of view and task constraints. Application area...
Ioannis Stamos, Peter K. Allen