Sciweavers

12673 search results - page 2504 / 2535
» Learning while designing
Sort
View
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 6 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
SIAMSC
2010
141views more  SIAMSC 2010»
13 years 6 months ago
An Iterative Method for Edge-Preserving MAP Estimation When Data-Noise Is Poisson
In numerous applications of image processing, e.g. astronomical and medical imaging, data-noise is well-modeled by a Poisson distribution. This motivates the use of the negative-lo...
Johnathan M. Bardsley, John Goldes
SIGMOD
2010
ACM
145views Database» more  SIGMOD 2010»
13 years 6 months ago
How to ConQueR why-not questions
One useful feature that is missing from today’s database systems is an explain capability that enables users to seek clarifications on unexpected query results. There are two t...
Quoc Trung Tran, Chee-Yong Chan
SMC
2010
IEEE
228views Control Systems» more  SMC 2010»
13 years 6 months ago
A safe communication scheme for an intelligent Wireless Networked Control System Coordination Agent
Abstract— Wireless networked control systems have begun to gain acceptance during the last decade, largely due to the increased flexibility and lower costs they promise to provi...
James H. Taylor, Hazem M. S. Ibrahim, Jeff Slipp, ...
TC
2010
13 years 6 months ago
Multicasting in Quantum Switching Networks
—In this paper, we present a quantum multicasting network, called a generalized quantum connector (n-GQC), which can be used to multicast quantum information from n inputs to n o...
Manish Kumar Shukla, A. Yavuz Oruç
« Prev « First page 2504 / 2535 Last » Next »