Sciweavers

204 search results - page 38 / 41
» el 2006
Sort
View
JMLR
2002
89views more  JMLR 2002»
14 years 9 months ago
A Robust Minimax Approach to Classification
When constructing a classifier, the probability of correct classification of future data points should be maximized. We consider a binary classification problem where the mean and...
Gert R. G. Lanckriet, Laurent El Ghaoui, Chiranjib...
101
Voted
ETT
2000
91views Education» more  ETT 2000»
14 years 10 months ago
Performance Analysis and Estimation of Call Admission Control Parameters in Wireless Integrated Voice and Data Networks
We propose an admission control policy for wireless multimedia networks that is based on the well known threshold-based guard channel method. The new scheme deals with two differen...
Mahmoud T. El-Hadidi, Khaled M. F. Elsayed, Mohame...
105
Voted
IJET
2007
214views more  IJET 2007»
14 years 10 months ago
Employing Collaborative Learning Strategies in Online Conflict Resolution
—Although some critics may argue that conflict resolution cannot be carried out appropriately by virtual education, the basic elements of conflict present themselves within dista...
Samir Abou El-Seoud, Carme Anguera Iglesias, Marga...
99
Voted
JOC
2000
181views more  JOC 2000»
14 years 10 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
CN
2006
60views more  CN 2006»
14 years 10 months ago
Loss strategies for competing AIMD flows
We study in this paper two competing AIMD flows that share a common bottleneck link. When congestion occurs, one (or both) flows will suffer a loss that will cause its throughput ...
Eitan Altman, Rachid El Azouzi, David Ros, Bruno T...