Sciweavers

2027 search results - page 149 / 406
» When is it best to best-respond
Sort
View
SIAMSC
2010
155views more  SIAMSC 2010»
14 years 8 months ago
Quasi-Newton Methods on Grassmannians and Multilinear Approximations of Tensors
In this paper we proposed quasi-Newton and limited memory quasi-Newton methods for objective functions defined on Grassmannians or a product of Grassmannians. Specifically we defin...
Berkant Savas, Lek-Heng Lim
TON
2010
107views more  TON 2010»
14 years 8 months ago
Leveraging Dynamic Spare Capacity in Wireless Systems to Conserve Mobile Terminals' Energy
In this paper we study several ways in which mobile terminals can backoff on their uplink transmit power in order to extend battery lifetimes. This is particularly effective when a...
Hongseok Kim, Gustavo de Veciana
CVPR
2011
IEEE
14 years 5 months ago
Global Optimization for Optimal Generalized Procrustes Analysis
This paper deals with generalized procrustes analysis. This is the problem of registering a set of shape data by estimating a reference shape and a set of rigid transformations gi...
Daniel Pizarro, Adrien Bartoli
ICASSP
2011
IEEE
14 years 5 months ago
Social norm and long-run learning in peer-to-peer networks
We start by formulating the resource sharing in peer-to-peer (P2P) networks as a random-matching gift-giving game, where self-interested peers aim at maximizing their own long-ter...
Yu Zhang, Mihaela van der Schaar
ICASSP
2011
IEEE
14 years 5 months ago
Equiangular tight frame fingerprinting codes
We show that equiangular tight frames (ETFs) are particularly well suited as additive fingerprint designs against Gaussian averaging collusion attacks when the number of users is...
Dustin G. Mixon, Christopher J. Quinn, Negar Kiyav...