Sciweavers

25316 search results - page 4862 / 5064
» Computational sensor networks
Sort
View
MST
2006
99views more  MST 2006»
15 years 3 months ago
Complexity of the Exact Domatic Number Problem and of the Exact Conveyor Flow Shop Problem
We prove that the exact versions of the domatic number problem are complete for the levels of the boolean hierarchy over NP. The domatic number problem, which arises in the area of...
Tobias Riege, Jörg Rothe
151
Voted
MVA
2006
205views Computer Vision» more  MVA 2006»
15 years 3 months ago
Ontological inference for image and video analysis
Abstract This paper presents an approach to designing and implementing extensible computational models for perceiving systems based on a knowledge-driven joint inference approach. ...
Christopher Town
SIGMETRICS
2008
ACM
144views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Co-designing the failure analysis and monitoring of large-scale systems
Large-scale distributed systems provide the backbone for numerous distributed applications and online services. These systems span over a multitude of computing nodes located at d...
Abhishek Chandra, Rohini Prinja, Sourabh Jain, Zhi...
152
Voted
IJNSEC
2007
139views more  IJNSEC 2007»
15 years 3 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
128
Voted
IJNSEC
2007
137views more  IJNSEC 2007»
15 years 3 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram
« Prev « First page 4862 / 5064 Last » Next »