Sciweavers

2607 search results - page 438 / 522
» Complete Functional Synthesis
Sort
View
IJSNET
2006
106views more  IJSNET 2006»
13 years 10 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue
JCM
2008
121views more  JCM 2008»
13 years 10 months ago
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
Yihui Zhang, Li Xu, Xiaoding Wang
CORR
2007
Springer
113views Education» more  CORR 2007»
13 years 10 months ago
Virtual screening with support vector machines and structure kernels
Support vector machines and kernel methods have recently gained considerable attention in chemoinformatics. They offer generally good performance for problems of supervised classi...
Pierre Mahé, Jean-Philippe Vert
CORR
2007
Springer
110views Education» more  CORR 2007»
13 years 10 months ago
Relations between random coding exponents and the statistical physics of random codes
The partition function pertaining to finite–temperature decoding of a (typical) randomly chosen code is known to have three types of behavior, corresponding to three phases in ...
Neri Merhav
JSYML
2008
63views more  JSYML 2008»
13 years 10 months ago
Classifying model-theoretic properties
In 2004 Csima, Hirschfeldt, Knight, and Soare [1] showed that a set A T 0 is nonlow2 if and only if A is prime bounding, i.e. for every complete atomic decidable theory T , there i...
Chris J. Conidis