Sciweavers

358 search results - page 42 / 72
» Protocols from perceptual observations
Sort
View
LISA
2007
15 years 2 months ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...
ICC
2009
IEEE
135views Communications» more  ICC 2009»
14 years 9 months ago
Adaptive Compress-and-Forward Relaying in Fading Environments with or without Wyner-Ziv Coding
Abstract--Compress-and-Forward is a protocol for transmission over relay networks in which the relay forwards a compressed version of the signal it observes. The compression method...
Harold H. Sneessens, Luc Vandendorpe, J. Nicholas ...
CGF
2008
142views more  CGF 2008»
14 years 11 months ago
Combining Confocal Imaging and Descattering
In translucent objects, light paths are affected by multiple scattering, which is polluting any observation. Confocal imaging reduces the influence of such global illumination eff...
Christian Fuchs, Michael Heinz 0004, Marc Levoy, H...
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
ATAL
2006
Springer
15 years 3 months ago
Learning to commit in repeated games
Learning to converge to an efficient, i.e., Pareto-optimal Nash equilibrium of the repeated game is an open problem in multiagent learning. Our goal is to facilitate the learning ...
Stéphane Airiau, Sandip Sen