Sciweavers

635 search results - page 107 / 127
» Four states are enough!
Sort
View
ICASSP
2008
IEEE
14 years 4 months ago
An information theoretic approach to processing management
In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
Christopher M. Kreucher, Kevin M. Carter
INFOCOM
2008
IEEE
14 years 4 months ago
Complex Network Measurements: Estimating the Relevance of Observed Properties
Abstract—Complex networks, modeled as large graphs, received much attention during these last years. However, data on such networks is only available through intricate measuremen...
Matthieu Latapy, Clémence Magnien
INFOCOM
2008
IEEE
14 years 4 months ago
On the Levy-Walk Nature of Human Mobility
—We report that human walks performed in outdoor settings of tens of kilometers resemble a truncated form of Levy walks commonly observed in animals such as monkeys, birds and ja...
Injong Rhee, Minsu Shin, Seongik Hong, Kyunghan Le...
SASO
2008
IEEE
14 years 4 months ago
nuBOINC: BOINC Extensions for Community Cycle Sharing
Currently, cycle sharing over the Internet is a one-way deal. Computer owners only have one role in the process: to donate their computers’ idle time. This is due to the fact th...
João Nuno Silva, Luís Veiga, Paulo F...
ACSAC
2007
IEEE
14 years 4 months ago
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting
Special purpose trusted computing devices are currently being deployed to offer many services for which the general purpose computing paradigm is unsuitable. The nature of the ser...
Aggelos Kiayias, Laurent Michel, Alexander Russell...