Sciweavers

2027 search results - page 68 / 406
» When is it best to best-respond
Sort
View
SIAMCOMP
2000
88views more  SIAMCOMP 2000»
15 years 14 days ago
Gadgets, Approximation, and Linear Programming
We present a linear programming-based method for nding \gadgets", i.e., combinatorial structures reducing constraints of one optimization problem to constraints of another. A...
Luca Trevisan, Gregory B. Sorkin, Madhu Sudan, Dav...
TCSV
2002
107views more  TCSV 2002»
15 years 10 days ago
Subband-adaptive turbo-coded OFDM-based interactive video telephony
A range of adaptive orthogonal frequency division multiplex (AOFDM) video systems are proposed for interactive communications over wireless channels. The proposed constant target b...
Peter J. Cherriman, Thomas Keller 0002, Lajos Hanz...
119
Voted
PRL
2008
147views more  PRL 2008»
15 years 5 days ago
Deformations, patches, and discriminative models for automatic annotation of medical radiographs
In this paper, we describe three different methods for the classification and annotation of medical radiographs. The methods were applied in the medical image annotation tasks of ...
Thomas Deselaers, Hermann Ney
93
Voted
PPSN
2010
Springer
14 years 11 months ago
Optimisation and Generalisation: Footprints in Instance Space
Abstract. The chief purpose of research in optimisation is to understand how to design (or choose) the most suitable algorithm for a given distribution of problem instances. Ideall...
David W. Corne, Alan P. Reynolds
RFIDSEC
2010
14 years 11 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...