Sciweavers

2642 search results - page 445 / 529
» Merge-by-Wire: Algorithms and System Support
Sort
View
147
Voted
AISS
2010
97views more  AISS 2010»
15 years 1 months ago
The Naming Service of Multi-Agent for the Sensor Network Applications
The node selection for the migration of a mobile agent depends on the content of the referenced metadata in the naming space. The reliability of the migrated information is determ...
Yonsik Lee, Minseok Jang
152
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Spectrum Aware Opportunistic Routing in Cognitive Radio Networks
Cognitive radio (CR) emerges as a key technology to enhance spectrum efficiency and thus creates opportunistic transmissions over links. Supporting the routing function on top of n...
Shih-Chun Lin, Kwang-Cheng Chen
206
Voted
ISJGP
2010
15 years 27 days ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
174
Voted
JCST
2010
109views more  JCST 2010»
14 years 10 months ago
The Inverse Classification Problem
In this paper, we examine an emerging variation of the classification problem, which is known as the inverse classification problem. In this problem, we determine the features to b...
Charu C. Aggarwal, Chen Chen, Jiawei Han
173
Voted
TIM
2010
144views Education» more  TIM 2010»
14 years 10 months ago
Extending Polynomial Chaos to Include Interval Analysis
Polynomial chaos theory (PCT) has been proven to be an efficient and effective way to represent and propagate uncertainty through system models and algorithms in general. In partic...
Antonello Monti, Ferdinanda Ponci, Marco Valtorta