Sciweavers

25316 search results - page 4879 / 5064
» Computational sensor networks
Sort
View
119
Voted
IJWMC
2010
103views more  IJWMC 2010»
15 years 27 days ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
137
Voted
INFORMS
2010
147views more  INFORMS 2010»
15 years 27 days ago
Exact Algorithms for the Quadratic Linear Ordering Problem
The quadratic linear ordering problem naturally generalizes various optimization problems, such as bipartite crossing minimization or the betweenness problem, which includes linear...
Christoph Buchheim, Angelika Wiegele, Lanbo Zheng
153
Voted
ISCI
2010
146views more  ISCI 2010»
15 years 27 days ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
162
Voted
CCR
2011
14 years 10 months ago
Application flow control in YouTube video streams
This paper presents the results of an investigation into the application flow control technique utilised by YouTube. We reveal and describe the basic properties of YouTube applic...
Shane Alcock, Richard Nelson
133
Voted
CDC
2010
IEEE
144views Control Systems» more  CDC 2010»
14 years 10 months ago
Formal analysis of piecewise affine systems through formula-guided refinement
Abstract-- We present a computational framework for identifying a set of initial states from which all trajectories of a piecewise affine (PWA) system satisfy a Linear Temporal Log...
Boyan Yordanov, Jana Tumova, Calin Belta, Ivana Ce...
« Prev « First page 4879 / 5064 Last » Next »