Sciweavers

12264 search results - page 2346 / 2453
» Analysis of the rubberband algorithm
Sort
View
159
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
MOBIHOC
2005
ACM
16 years 3 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
127
Voted
POPL
2010
ACM
16 years 28 days ago
Dependent Types from Counterexamples
d by recent research in abstract model checking, we present a new approach to inferring dependent types. Unlike many of the existing approaches, our approach does not rely on prog...
Tachio Terauchi
PPOPP
2010
ACM
16 years 24 days ago
A distributed placement service for graph-structured and tree-structured data
Effective data placement strategies can enhance the performance of data-intensive applications implemented on high end computing clusters. Such strategies can have a significant i...
Gregory Buehrer, Srinivasan Parthasarathy, Shirish...
213
Voted
MICCAI
2009
Springer
16 years 24 days ago
A Statistical Model of Right Ventricle in Tetralogy of Fallot for Prediction of Remodelling and Therapy Planning
Tetralogy of Fallot (ToF) is a severe congenital heart disease that mainly affects the right ventricle (RV). It requires surgical repair early in infancy. Chronic regurgitations ma...
Tommaso Mansi, Stanley Durrleman, Boris Bernhardt,...
« Prev « First page 2346 / 2453 Last » Next »