Sciweavers

1058 search results - page 54 / 212
» It's Doomed; We Can Prove It
Sort
View
COMSWARE
2007
IEEE
14 years 4 months ago
Distributed Fault-Tolerant Topology Control in Static and Mobile Wireless Sensor Networks
— In wireless sensor networks, minimizing power consumption and at the same time maintaining desired properties in the network topology is of prime importance. In this work, we p...
Indranil Saha, Lokesh Kumar Sambasivan, Ranjeet Ku...
ADBIS
2007
Springer
117views Database» more  ADBIS 2007»
14 years 4 months ago
Improving the Performance of M-Tree Family by Nearest-Neighbor Graphs
The M-tree and its variants have been proved to provide an efficient similarity search in database environments. In order to further improve their performance, in this paper we pro...
Tomás Skopal, David Hoksza
ICDE
2009
IEEE
160views Database» more  ICDE 2009»
13 years 7 months ago
Perm: Processing Provenance and Data on the Same Data Model through Query Rewriting
Data provenance is information that describes how a given data item was produced. The provenance includes source and intermediate data as well as the transformations involved in pr...
Boris Glavic, Gustavo Alonso
TVCG
2012
176views Hardware» more  TVCG 2012»
12 years 11 days ago
Point-Based Manifold Harmonics
—This paper proposes an algorithm to build a set of orthogonal Point-Based Manifold Harmonic Bases (PB-MHB) for spectral analysis over point-sampled manifold surfaces. To ensure ...
Yang Liu, Balakrishnan Prabhakaran, Xiaohu Guo
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
12 years 10 days ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...