Sciweavers

283 search results - page 24 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
PERCOM
2008
ACM
14 years 7 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...
EH
2002
IEEE
113views Hardware» more  EH 2002»
14 years 20 days ago
Evolution in materio: Looking Beyond the Silicon Box
It is argued that natural evolution is, par excellence, an algorithm that exploits the physical properties of materials. Such an exploitation of the physical characteristics has a...
Julian F. Miller, Keith L. Downing
ICDCSW
2000
IEEE
14 years 3 days ago
Games-Based Model Checking of Protocols: counting doesn't count
We introduce a technique that can be used to model the behaviour of protocols. In our model each process within a protocol belongs to a particular class. A set of rules governs th...
Tim Kempster, Colin Stirling, Peter Thanisch
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 7 months ago
Phase Transitions for Greedy Sparse Approximation Algorithms
A major enterprise in compressed sensing and sparse approximation is the design and analysis of computationally tractable algorithms for recovering sparse, exact or approximate, s...
Jeffrey D. Blanchard, Coralia Cartis, Jared Tanner...
SPEECH
2002
112views more  SPEECH 2002»
13 years 7 months ago
Relating dialogue games to information state
This paper1 discusses the use of `conversational' or `dialogue games' as a basis for building dialogue systems. We give a tutorial overview of some recent attempts to re...
Stephen G. Pulman