Sciweavers

1087 search results - page 188 / 218
» Generation under Space Constraints
Sort
View
TWC
2008
138views more  TWC 2008»
13 years 10 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
COMCOM
2002
99views more  COMCOM 2002»
13 years 10 months ago
Joint server scheduling and proxy caching for video delivery
Abstract-- We consider the delivery of video assets over a besteffort network, possibly through a caching proxy located close to the clients generating the requests. We are interes...
Olivier Verscheure, Chitra Venkatramani, Pascal Fr...
NCA
2002
IEEE
13 years 10 months ago
The Construction of Smooth Models using Irregular Embeddings Determined by a Gamma Test Analysis
One of the key problems in forming a smooth model from input-output data is the determination of which input variables are relevant in predicting a given output. In this paper we ...
Alban P. M. Tsui, Antonia J. Jones, A. Guedes de O...
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 9 months ago
Robust PCA via Outlier Pursuit
Singular Value Decomposition (and Principal Component Analysis) is one of the most widely used techniques for dimensionality reduction: successful and efficiently computable, it ...
Huan Xu, Constantine Caramanis, Sujay Sanghavi
CAISE
2010
Springer
13 years 7 months ago
Towards Automated Inconsistency Handling in Design Models
Abstract. The increasing adoption of MDD (Model Driven Development) techniques favored the use of large models of different types. It turns out that when the modeled system gets la...
Marcos Aurélio Almeida da Silva, Alix Mouge...