Papers published on a yearly basis
Papers
More filters
•
01 Jan 1997TL;DR: The result yields a solution to the problem of information-theoretically secure Oblivious RAM simulation with poly-log overhead in the above setting and implies that eecient instance-hiding schemes where the state can be altered are possible.
104 citations
•
15 May 1997TL;DR: In this article, the authors proposed a multicast capability for Personal Location Service (PLS), Personal Communications Internetworking (PCI), call blocking, and response delivery system (RDS).
Abstract: A communications network simultaneously transmits a single message to a number of recipients. This is called a 'multicast' transmission. The communications network should have a recipient list database (1302) to receive a list of recipient addresses, a message database (1304) to receive and store the message, and a message delivery system (1306) to send the message to a number of recipients. The communications network may be adapted to collect acknowledgements or responses to a multicast message. If so, the communications network should have a calling record (1308) for storing message delivery information, a response record (1310) for receiving and storing recipient response information, a response processor (1312) for processing the response information, and a response delivery system (1314) for delivering the processed response. The multicast capability may be integrated with other communications network services, such as Personal Location Service, Personal Communications Internetworking, call blocking, etc.
104 citations
•
TL;DR: In this paper, a real-time and non-real-time video stream is encoded at the Application and Services layer and transmitted to the receiving terminal, which then supplies the receiver with the necessary decoding software to play any type of encoded video stream.
Abstract: Encoding a real-time and non-real-time video stream, encapsulating the encoded video stream along with the decoding software corresponding to the encoding program into active packets at the Application and Services layer, and transmitting active the packets to the receiving terminal, which then supplies the receiver with the necessary decoding software to play any type of encoded video stream without having the associated decoding software pre-loaded.
104 citations
•
03 Aug 2005TL;DR: In this paper, a multi-interface mobility management (MIMM) client is provided on a mobile Multi-Interface Device (MID) to support seamless network connectivity and switching of the MIMM client.
Abstract: A Multi-Interface Mobility Management (MIMM) client is provided on a mobile Multi-Interface Device (MID) to support seamless network connectivity and switching of the MID. The MIMM client communicates with a MIMM Server. The MIMM Server collects information from MIMM Clients and provides information to the MIMM Clients pertaining to the network(s) to which the mobile MID has access, such as information concerning the availability of a network, the quality of network connectivity, etc. The MIMM Client is responsible for determining whether and when a handoff or roaming operation should be initiated by the mobile MID, and which network interface the mobile MID should use after the handoff/roam operation has been completed. The MIMM Client also is responsible for performing mobility-related functions that are required prior and subsequent to the handoff/roam operation. The MIMM Client uses the information received from the MIMM Server in order to make these determinations.
104 citations
••
TL;DR: The Legendre and Hermite indexes as discussed by the authors are weighted L 2 distance between the density of the projected data and a standard normal density, which is a general form for this type of index that encompasses both indexes.
Abstract: Projection pursuit describes a procedure for searching high-dimensional data for “interesting” low-dimensional projections via the optimization of a criterion function called the projection pursuit index. By empirically examining the optimization process for several projection pursuit indexes, we observed differences in the types of structure that maximized each index. We were especially curious about differences between two indexes based on expansions in terms of orthogonal polynomials, the Legendre index, and the Hermite index. Being fast to compute, these indexes are ideally suited for dynamic graphics implementations. Both Legendre and Hermite indexes are weighted L 2 distances between the density of the projected data and a standard normal density. A general form for this type of index is introduced that encompasses both indexes. The form clarifies the effects of the weight function on the index's sensitivity to differences from normality, highlighting some conceptual problems with the Legen...
104 citations
Authors
Showing all 3097 results
Name | H-index | Papers | Citations |
---|---|---|---|
Joseph E. Stiglitz | 164 | 1142 | 152469 |
Pete Smith | 156 | 2464 | 138819 |
Jean-Marie Tarascon | 136 | 853 | 137673 |
Ramamoorthy Ramesh | 122 | 649 | 67418 |
Martin Vetterli | 105 | 761 | 57825 |
Noga Alon | 104 | 895 | 44575 |
Amit P. Sheth | 101 | 753 | 42655 |
Harold G. Craighead | 101 | 569 | 40357 |
Susan T. Dumais | 100 | 346 | 60206 |
Andrzej Cichocki | 97 | 952 | 41471 |
Robert E. Kraut | 97 | 297 | 38116 |
Kishor S. Trivedi | 95 | 698 | 36816 |
David R. Clarke | 90 | 553 | 36039 |
Axel Scherer | 90 | 736 | 43939 |
Michael R. Lyu | 89 | 696 | 33257 |