Sciweavers

13784 search results - page 2647 / 2757
» On Computing Functions with Uncertainty
Sort
View
IMA
2007
Springer
97views Cryptology» more  IMA 2007»
14 years 3 months ago
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
Non-linear cryptanalysis is a natural extension to Matsui’s linear cryptanalitic techniques in which linear approximations are replaced by nonlinear expressions. Non-linear appro...
Juan M. Estévez-Tapiador, John A. Clark, Ju...
IPSN
2007
Springer
14 years 3 months ago
A platform for ubiquitous sensor deployment in occupational and domestic environments
In this paper, we introduce the “Plug” sensor network, a ubiquitous networked sensing platform ideally suited to broad deployment in environments where people work and live. T...
Joshua Lifton, Mark Feldmeier, Yasuhiro Ono, Camer...
IPSN
2007
Springer
14 years 3 months ago
The worst-case capacity of wireless sensor networks
The key application scenario of wireless sensor networks is data gathering: sensor nodes transmit data, possibly in a multi-hop fashion, to an information sink. The performance of...
Thomas Moscibroda
IPSN
2007
Springer
14 years 3 months ago
The regiment macroprogramming system
The development of high-level programming environments is essential if wireless sensor networks are to be accessible to nonexperts. In this paper, we present the Regiment system, ...
Ryan Newton, Greg Morrisett, Matt Welsh
ISVC
2007
Springer
14 years 3 months ago
Boosting with Temporal Consistent Learners: An Application to Human Activity Recognition
We present a novel boosting algorithm where temporal consistency is addressed in a short-term way. Although temporal correlation of observed data may be an important cue for classi...
Pedro Canotilho Ribeiro, Plinio Moreno, José...
« Prev « First page 2647 / 2757 Last » Next »