Sciweavers

460 search results - page 71 / 92
» A Symmetric Convexity Measure
Sort
View
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 7 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
CORR
2008
Springer
149views Education» more  CORR 2008»
13 years 7 months ago
Phase Transitions on Fixed Connected Graphs and Random Graphs in the Presence of Noise
In this paper, we study phase transition behavior emerging from the interactions among multiple agents in the presence of noise. We propose a simple discrete-time model in which a...
Jialing Liu, Vikas Yadav, Hullas Sehgal, Joshua M....
CN
2007
99views more  CN 2007»
13 years 7 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
MJ
2008
71views more  MJ 2008»
13 years 7 months ago
A new type of structural defects in CdZnSe/ZnSe heterostructures
The changes of structural and photoluminescence (PL) characteristics of MBE-grown CdZnSe/ZnSe single quantum well (QW) structures caused by Cd/Zn interdiffusion were studied by hi...
L. V. Borkovska, N. Korsunska, V. Kladko, M. Slobo...
TSE
1998
128views more  TSE 1998»
13 years 7 months ago
Modeling and Evaluating Design Alternatives for an On-Line Instrumentation System: A Case Study
—This paper demonstrates the use of a model-based evaluation approach for instrumentation systems (ISs). The overall objective of this study is to provide early feedback to tool ...
Abdul Waheed, Diane T. Rover, Jeffrey K. Hollingsw...