Sciweavers

1081 search results - page 32 / 217
» Working with the LR Degrees
Sort
View
PRL
2006
95views more  PRL 2006»
15 years 18 days ago
Inhibition of false landmarks
Corners and junctions are landmarks characterized by the lack of differentiability in the unit tangent to the image level curve. Detectors based on differential operators are not,...
Debora Gil, Petia Radeva
103
Voted
GLOBECOM
2010
IEEE
14 years 10 months ago
Providing Secrecy Irrespective of Eavesdropper's Channel State
A usual concern against physical layer security is that the legitimate parties would need to have (partial) channel state information (CSI) of the eavesdropper in order to design t...
Xiang He, Aylin Yener
110
Voted
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
16 years 1 months ago
Efficient influence maximization in social networks
Influence maximization is the problem of finding a small subset of nodes (seed nodes) in a social network that could maximize the spread of influence. In this paper, we study the ...
Wei Chen, Yajun Wang, Siyu Yang
APPROX
2010
Springer
179views Algorithms» more  APPROX 2010»
15 years 2 months ago
Rumor Spreading on Random Regular Graphs and Expanders
Broadcasting algorithms are important building blocks of distributed systems. In this work we investigate the typical performance of the classical and well-studied push model. Assu...
Nikolaos Fountoulakis, Konstantinos Panagiotou
TC
2008
15 years 18 days ago
Hardware Implementation Trade-Offs of Polynomial Approximations and Interpolations
This paper examines the hardware implementation trade-offs when evaluating functions via piecewise polynomial approximations and interpolations for precisions of up to 24 bits. In ...
Dong-U Lee, Ray C. C. Cheung, Wayne Luk, John D. V...