Sciweavers

2370 search results - page 258 / 474
» The Characterization of Data-Accumulating Algorithms
Sort
View
CEC
2008
IEEE
15 years 10 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...
154
Voted
FOCS
2008
IEEE
15 years 10 months ago
On the Hardness of Being Truthful
The central problem in computational mechanism design is the tension between incentive compatibility and computational ef ciency. We establish the rst significant approximability ...
Christos H. Papadimitriou, Michael Schapira, Yaron...
ICC
2008
IEEE
108views Communications» more  ICC 2008»
15 years 10 months ago
Minimizing Interferences in Wireless Ad Hoc Networks through Topology Control
— This paper investigates minimizing mutual interferences in wireless ad hoc networks by means of topology control. Prior work defines interference as a relationship between link...
Guinian Feng, Soung Chang Liew, Pingyi Fan
ICCV
2007
IEEE
15 years 10 months ago
Diffusion Tensor Image Smoothing Using Efficient and Effective Anisotropic Filtering
To improve the accuracy of tissue structural and architectural characterization with diffusion tensor imaging, an anisotropic smoothing algorithm is presented for reducing noise i...
Qing Xu 0003, Adam W. Anderson, John C. Gore, Zhao...
IJCNN
2007
IEEE
15 years 10 months ago
Analysis of mammogram using self-organizing neural networks based on spatial isomorphism
— The correct segmentation and measurement of mammography images is of fundamental importance for the development of automatic or computer-aided cancer detection systems. In this...
Aida A. Ferreira, Francisco Nascimento Jr., Ing Re...