Sciweavers

2944 search results - page 170 / 589
» Improving Bound Propagation
Sort
View
SECON
2008
IEEE
14 years 4 months ago
Understanding Radio Irregularity in Wireless Networks
— In an effort to better understand connectivity and capacity in wireless networks, the log-normal shadowing radio propagation model is used to capture radio irregularities and o...
Torsten Muetze, Patrick Stuedi, Fabian Kuhn, Gusta...
CP
2007
Springer
14 years 4 months ago
The Log-Support Encoding of CSP into SAT
It is known that Constraint Satisfaction Problems (CSP) can be converted into Boolean Satisfiability problems (SAT); however how to encode a CSP into a SAT problem such that a SAT...
Marco Gavanelli
IPPS
2006
IEEE
14 years 4 months ago
Power-aware data dissemination protocols in wireless sensor networks
Recent rapid technological developments have led to the development of tiny, low-power, low-cost sensors. Such devices integrate sensing, limited data processing and communication...
Sotiris E. Nikoletseas
ISCC
2006
IEEE
14 years 4 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
ICPR
2010
IEEE
14 years 1 months ago
Quasi-Dense Wide Baseline Matching for Three Views
This paper proposes a method for computing a quasi-dense set of matching points between three views of a scene. The method takes a sparse set of seed matches between pairs of view...
Pekka Koskenkorva, Juho Kannala, Sami Sebastian Br...