Sciweavers

4037 search results - page 618 / 808
» Routing without ordering
Sort
View
VTC
2010
IEEE
142views Communications» more  VTC 2010»
15 years 2 months ago
Low-Feedback Multiple-Access and Scheduling via Location and Geometry Information
—This paper exploits the use of location information of wireless terminals to improve the performance of a beamforming system and support multiple access. Based on a system provi...
Congzheng Han, Matthew Webb, Angela Doufexi, Mark ...
VTC
2010
IEEE
127views Communications» more  VTC 2010»
15 years 2 months ago
Inter-Site Joint Detection with Reduced Backhaul Capacity Requirements for the 3GPP LTE Uplink
—Cellular networks operating with a frequency reuse factor of one are often interference-limited. For that reason, base station (BS) cooperation techniques aiming at mitigating t...
Philipp Frank, Andreas Müller, Joachim Speide...
ASIACRYPT
2010
Springer
15 years 2 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
BMVC
2010
15 years 2 months ago
The Fastest Pedestrian Detector in the West
We demonstrate a multiscale pedestrian detector operating in near real time (5 fps on 640x480 images) with state-of-the-art detection performance. The computational bottleneck of ...
Piotr Dollár, Serge Belongie, Pietro Perona
BMVC
2010
15 years 2 months ago
Additive Update Predictors in Active Appearance Models
The Active Appearance Model (AAM) provides an efficient method for localizing objects that vary in both shape and texture, and uses a linear regressor to predict updates to model ...
Philip A. Tresadern, Patrick Sauer, Timothy F. Coo...