Sciweavers

2446 search results - page 287 / 490
» Characterizing the Performance of
Sort
View
GLOBECOM
2009
IEEE
15 years 8 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
ICDE
2010
IEEE
221views Database» more  ICDE 2010»
15 years 4 months ago
A generic auto-provisioning framework for cloud databases
— We discuss the problem of resource provisioning for database management systems operating on top of an Infrastructure-As-A-Service (IaaS) cloud. To solve this problem, we descr...
Jennie Rogers, Olga Papaemmanouil, Ugur Çet...
CORR
2011
Springer
243views Education» more  CORR 2011»
14 years 11 months ago
Localization from Incomplete Noisy Distance Measurements
—We consider the problem of positioning a cloud of points in the Euclidean space Rd , from noisy measurements of a subset of pairwise distances. This task has applications in var...
Adel Javanmard, Andrea Montanari
CVPR
2005
IEEE
16 years 6 months ago
Evaluating Image Retrieval
We present a comprehensive strategy for evaluating image retrieval algorithms. Because automated image retrieval is only meaningful in its service to people, performance character...
Nikhil V. Shirahatti, Kobus Barnard
ICRA
2008
IEEE
142views Robotics» more  ICRA 2008»
15 years 10 months ago
Gaussian mixture models for probabilistic localization
— One of the key tasks during the realization of probabilistic approaches to localization is the design of a proper sensor model, that calculates the likelihood of a measurement ...
Patrick Pfaff, Christian Plagemann, Wolfram Burgar...