Sciweavers

2027 search results - page 155 / 406
» When is it best to best-respond
Sort
View
SBBD
2008
256views Database» more  SBBD 2008»
15 years 2 months ago
Indexing Internal Memory with Minimal Perfect Hash Functions
A perfect hash function (PHF) is an injective function that maps keys from a set S to unique values, which are in turn used to index a hash table. Since no collisions occur, each k...
Fabiano C. Botelho, Hendrickson R. Langbehn, Guilh...
ITIIS
2010
129views more  ITIIS 2010»
14 years 8 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
CHI
2011
ACM
14 years 4 months ago
What did i miss?: in-meeting review using multimodal accelerated instant replay (air) conferencing
People sometimes miss small parts of meetings and need to quickly catch up without disrupting the rest of the meeting. We developed an Accelerated Instant Replay (AIR) Conferencin...
Sasa Junuzovic, Kori Inkpen, Rajesh Hegde, Zhengyo...
CVPR
2006
IEEE
16 years 3 months ago
Selecting Principal Components in a Two-Stage LDA Algorithm
Linear Discriminant Analysis (LDA) is a well-known and important tool in pattern recognition with potential applications in many areas of research. The most famous and used formul...
Aleix M. Martínez, Manli Zhu
EUROCRYPT
2009
Springer
16 years 1 months ago
Cube Attacks on Tweakable Black Box Polynomials
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bit...
Itai Dinur, Adi Shamir