Sciweavers

950 search results - page 126 / 190
» Constraint Based Resilience Analysis
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
CVPR
2010
IEEE
14 years 3 months ago
Hierarchical Convolutional Sparse Image Decomposition
Building robust low and mid-level image representations, beyond edge primitives, is a long-standing goal in vision. Many existing feature detectors spatially pool edge information...
Matthew Zeiler, Dilip Krishnan, Graham Taylor, Rob...
HYBRID
2009
Springer
14 years 2 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
CAIP
2009
Springer
249views Image Analysis» more  CAIP 2009»
14 years 2 months ago
Real-Time Volumetric Reconstruction and Tracking of Hands in a Desktop Environment
A probabilistic framework for vision based volumetric reconstruction and marker free tracking of hand and face volumes is presented, which exclusively relies on off-the-shelf hardw...
Christoph John, Ulrich Schwanecke, Holger Regenbre...
GLOBECOM
2007
IEEE
14 years 2 months ago
Contraction Approach to Power Control, with Non-Monotonic Applications
Abstract—In wireless networks, monotonic, strictly subhomogeneous functions have been used to analyze power control algorithms. We provide an alternative analysis based on the ob...
Carl J. Nuzman