Sciweavers

24529 search results - page 4885 / 4906
» Computing on Authenticated Data
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
INFORMATICALT
2010
122views more  INFORMATICALT 2010»
13 years 8 months ago
On a Time-Varying Parameter Adaptive Self-Organizing System in the Presence of Large Outliers in Observations
In the previous papers (Pupeikis, 2000; Genov et al., 2006; Atanasov and Pupeikis, 2009), a direct approach for estimating the parameters of a discrete-time linear time-invariant (...
Rimantas Pupeikis
JACM
2010
137views more  JACM 2010»
13 years 8 months ago
Reconciling description logics and rules
Description logics (DLs) and rules are formalisms that emphasize different aspects of knowledge representation: whereas DLs are focused on specifying and reasoning about conceptual...
Boris Motik, Riccardo Rosati
JAIR
2010
162views more  JAIR 2010»
13 years 8 months ago
Text Relatedness Based on a Word Thesaurus
The computation of relatedness between two fragments of text in an automated manner requires taking into account a wide range of factors pertaining to the meaning the two fragment...
George Tsatsaronis, Iraklis Varlamis, Michalis Vaz...
JCST
2010
119views more  JCST 2010»
13 years 8 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
« Prev « First page 4885 / 4906 Last » Next »