Sciweavers

1136 search results - page 123 / 228
» Finding Small Holes
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks
Key predistribution schemes are a favoured solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback ...
Tyler Moore
MOBISYS
2003
ACM
14 years 8 months ago
System Services for Ad-Hoc Routing: Architecture, Implementation and Experiences
This work explores several system issues regarding the design and implementation of routing protocols for ad-hoc wireless networks. We examine the routing architecture in current ...
Vikas Kawadia, Yongguang Zhang, Binita Gupta
DCC
2006
IEEE
14 years 8 months ago
Non-Asymptotic Design of Finite State Universal Predictors for Individual Sequences
In this work we consider the problem of universal prediction of individual sequences where the universal predictor is a deterministic finite state machine, with a fixed, relativel...
Amir Ingber, Meir Feder
WEBDB
2009
Springer
115views Database» more  WEBDB 2009»
14 years 3 months ago
A Machine Learning Approach to Foreign Key Discovery
We study the problem of automatically discovering semantic associations between schema elements, namely foreign keys. This problem is important in all applications where data sets...
Alexandra Rostin, Oliver Albrecht, Jana Bauckmann,...
ESA
2009
Springer
149views Algorithms» more  ESA 2009»
14 years 3 months ago
Sparse Cut Projections in Graph Streams
Finding sparse cuts is an important tool for analyzing large graphs that arise in practice, such as the web graph, online social communities, and VLSI circuits. When dealing with s...
Atish Das Sarma, Sreenivas Gollapudi, Rina Panigra...