Sciweavers

13784 search results - page 2520 / 2757
» On Computing Functions with Uncertainty
Sort
View
MOBISYS
2004
ACM
14 years 8 months ago
A Mechanism for Host Mobility Management supporting Application Awareness
Many approaches exist today that address the issues that arise when a mobile node changes its point(s) of attachment to the Internet. Mobile IP takes care of host mobility at the ...
Arjan J. H. Peddemors, Hans Zandbelt, Mortaza S. B...
MOBIHOC
2008
ACM
14 years 8 months ago
Analyzing DISH for multi-channel MAC protocols in wireless networks
For long, node cooperation has been exploited as a data relaying mechanism. However, the wireless channel allows for much richer interaction between nodes. One such scenario is in...
Tie Luo, Mehul Motani, Vikram Srinivasan
DCC
2004
IEEE
14 years 8 months ago
Discrete Universal Filtering Through Incremental Parsing
In the discrete filtering problem, a data sequence over a finite alphabet is assumed to be corrupted by a discrete memoryless channel. The goal is to reconstruct the clean sequenc...
Erik Ordentlich, Tsachy Weissman, Marcelo J. Weinb...
CVPR
2009
IEEE
14 years 7 months ago
Markov Chain Monte Carlo Combined with Deterministic Methods for Markov Random Field Optimization
Many vision problems have been formulated as en- ergy minimization problems and there have been signif- icant advances in energy minimization algorithms. The most widely-used energ...
Wonsik Kim (Seoul National University), Kyoung Mu ...
PLDI
2010
ACM
14 years 6 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
« Prev « First page 2520 / 2757 Last » Next »