Sciweavers

42388 search results - page 8448 / 8478
» Classification Using Information
Sort
View
SIAMDM
2010
149views more  SIAMDM 2010»
13 years 7 months ago
Formal Theory of Noisy Sensor Network Localization
Graph theory has been used to characterize the solvability of the sensor network localization problem. If sensors correspond to vertices and edges correspond to sensor pairs betwee...
Brian D. O. Anderson, Iman Shames, Guoqiang Mao, B...
TKDE
2010
158views more  TKDE 2010»
13 years 7 months ago
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...
TPDS
2010
222views more  TPDS 2010»
13 years 7 months ago
Energy-Efficient Beaconless Geographic Routing in Wireless Sensor Networks
—Geographic routing is an attractive localized routing scheme for wireless sensor networks (WSNs) due to its desirable scalability and efficiency. Maintaining neighborhood inform...
Haibo Zhang, Hong Shen
UMUAI
2010
136views more  UMUAI 2010»
13 years 7 months ago
Towards affective camera control in games
Information about interactive virtual environments, such as games, is perceived by users through a virtual camera. While most interactive applications let users control the camera,...
Georgios N. Yannakakis, Héctor Perez Mart&i...
WDAG
2010
Springer
218views Algorithms» more  WDAG 2010»
13 years 7 months ago
Anonymous Asynchronous Systems: The Case of Failure Detectors
Abstract: Due the multiplicity of loci of control, a main issue distributed systems have to cope with lies in the uncertainty on the system state created by the adversaries that ar...
François Bonnet, Michel Raynal
« Prev « First page 8448 / 8478 Last » Next »