Sciweavers

142 search results - page 28 / 29
» Near-perfect Token Distribution
Sort
View
WDAG
2007
Springer
73views Algorithms» more  WDAG 2007»
14 years 2 months ago
On Self-stabilizing Synchronous Actions Despite Byzantine Attacks
Consider a distributed network of n nodes that is connected to a global source of “beats”. All nodes receive the “beats” simultaneously, and operate in lock-step. A scheme ...
Danny Dolev, Ezra N. Hoch
GECCO
2005
Springer
124views Optimization» more  GECCO 2005»
14 years 2 months ago
Evolving petri nets to represent metabolic pathways
Given concentrations of metabolites over a sequence of time steps, the metabolic pathway prediction problem seeks a set of reactions and rate constants for them that could yield t...
Jeremiah Nummela, Bryant A. Julstrom
DMSN
2004
ACM
14 years 2 months ago
Region streams: functional macroprogramming for sensor networks
Sensor networks present a number of novel programming challenges for application developers. Their inherent limitations of computational power, communication bandwidth, and energy...
Ryan Newton, Matt Welsh
WS
2004
ACM
14 years 2 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
AAAI
2010
13 years 9 months ago
A Two-Dimensional Topic-Aspect Model for Discovering Multi-Faceted Topics
This paper presents the Topic-Aspect Model (TAM), a Bayesian mixture model which jointly discovers topics and aspects. We broadly define an aspect of a document as a characteristi...
Michael Paul, Roxana Girju