Sciweavers

6770 search results - page 1336 / 1354
» How GPUs Work
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 2 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
MANSCI
2011
13 years 2 months ago
Organizational Change and Employee Stress
This article analyzes the relationship between organizational change and employee health. It illuminates the potentially negative outcomes of change at the level of the employee. ...
Michael S. Dahl
MONET
2011
13 years 2 months ago
Jamming in Wireless Networks Under Uncertainty
— The problem of jamming plays an important role in ensuring the quality and security of wireless communications, especially at this moment when wireless networks are quickly bec...
Eitan Altman, Konstantin Avrachenkov, Andrey Garna...
SIAMCOMP
2011
13 years 2 months ago
The Complexity of Early Deciding Set Agreement
Set agreement, where processors decisions constitute a set of outputs, is notoriously harder to analyze than consensus where the decisions are restricted to a single output. This ...
Eli Gafni, Rachid Guerraoui, Bastian Pochon
SIAMIS
2011
13 years 2 months ago
Large Scale Bayesian Inference and Experimental Design for Sparse Linear Models
Abstract. Many problems of low-level computer vision and image processing, such as denoising, deconvolution, tomographic reconstruction or superresolution, can be addressed by maxi...
Matthias W. Seeger, Hannes Nickisch
« Prev « First page 1336 / 1354 Last » Next »