Sciweavers

8094 search results - page 1600 / 1619
» Improvements in Formula Generalization
Sort
View
TIT
2010
146views Education» more  TIT 2010»
14 years 10 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
TMM
2010
152views Management» more  TMM 2010»
14 years 10 months ago
Network Awareness of P2P Live Streaming Applications: A Measurement Study
Abstract--Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about h...
Delia Ciullo, M.-A. Garcia da Rocha Neta, Á...
140
Voted
TOG
2010
96views more  TOG 2010»
14 years 10 months ago
Light reallocation for high contrast projection using an analog micromirror array
We demonstrate for the first time a proof of concept projector with a secondary array of individually controllable, analog micromirrors added to improve the contrast and peak brig...
Reynald Hoskinson, Boris Stoeber, Wolfgang Heidric...
TR
2010
140views Hardware» more  TR 2010»
14 years 10 months ago
Modeling Failure Modes for Residual Life Prediction Using Stochastic Filtering Theory
This paper reports on a theoretical Bayesian modeling development for residual life prediction in the context of condition-based maintenance. At each monitoring point during a comp...
Matthew J. Carr, Wenbin Wang
TSE
2010
197views more  TSE 2010»
14 years 10 months ago
A Genetic Algorithm-Based Stress Test Requirements Generator Tool and Its Empirical Evaluation
Genetic algorithms (GAs) have been applied previously to UML-driven, stress test requirements generation with the aim of increasing chances of discovering faults relating to networ...
Vahid Garousi
« Prev « First page 1600 / 1619 Last » Next »