Sciweavers

780 search results - page 96 / 156
» Correctness of Component-Based Adaptation
Sort
View
INFOCOM
2012
IEEE
12 years 7 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
TKDE
2012
270views Formal Methods» more  TKDE 2012»
11 years 11 months ago
Low-Rank Kernel Matrix Factorization for Large-Scale Evolutionary Clustering
—Traditional clustering techniques are inapplicable to problems where the relationships between data points evolve over time. Not only is it important for the clustering algorith...
Lijun Wang, Manjeet Rege, Ming Dong, Yongsheng Din...
DATE
2009
IEEE
131views Hardware» more  DATE 2009»
14 years 3 months ago
An event-guided approach to reducing voltage noise in processors
Abstract—Supply voltage fluctuations that result from inductive noise are increasingly troublesome in modern microprocessors. A voltage “emergency”, i.e., a swing beyond tol...
Meeta Sharma Gupta, Vijay Janapa Reddi, Glenn H. H...
GLOBECOM
2007
IEEE
14 years 3 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
IROS
2007
IEEE
135views Robotics» more  IROS 2007»
14 years 3 months ago
Self-organization of environmentally-adaptive shapes on a modular robot
— Modular robots have the potential to achieve a wide range of applications by reconfiguring their shapes to perform different functions. This requires robust and scalable contr...
Chih-Han Yu, François-Xavier Willems, Donal...