Sciweavers

5756 search results - page 1134 / 1152
» Describing Objects by their Attributes
Sort
View
COMCOM
2006
194views more  COMCOM 2006»
13 years 8 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
CE
2007
133views more  CE 2007»
13 years 8 months ago
Reusable, lifelike virtual humans for mentoring and role-playing
Lifelike, interactive digital characters, serving as mentors and role-playing actors, have been shown to significantly improve learner motivation and retention. However, the cost...
Edward M. Sims
IM
2008
13 years 8 months ago
Directed Random Dot Product Graphs
In this paper we consider three models for random graphs that utilize the inner product as their fundamental object. We analyze the behavior of these models with respect to cluster...
Stephen J. Young, Edward R. Scheinerman
CN
2007
168views more  CN 2007»
13 years 8 months ago
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
— Energy efficient operation is of paramount importance for battery-powered wireless nodes. In an effort to conserve energy, standard protocols for WLANs have the provision for w...
Mahasweta Sarkar, Rene L. Cruz
IOR
2008
89views more  IOR 2008»
13 years 8 months ago
Impulse Control of Brownian Motion: The Constrained Average Cost Case
When a manufacturer places repeated orders with a supplier to meet changing production requirements, he faces the challenge of finding the right balance between holding costs and ...
Melda Ormeci, J. G. Dai, John H. Vande Vate
« Prev « First page 1134 / 1152 Last » Next »