Sciweavers

5624 search results - page 1114 / 1125
» On Conditional Covering Problem
Sort
View
SSS
2010
Springer
154views Control Systems» more  SSS 2010»
13 years 5 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...
TMC
2010
138views more  TMC 2010»
13 years 5 months ago
Reliable Anchor-Based Sensor Localization in Irregular Areas
—Localization is a fundamental problem in wireless sensor networks and its accuracy impacts the efficiency of location-aware protocols and applications, such as routing and stora...
Bin Xiao, Lin Chen, Qingjun Xiao, Minglu Li
TPDS
2010
93views more  TPDS 2010»
13 years 5 months ago
Self-Consistent MPI Performance Guidelines
Message passing using the Message Passing Interface (MPI) is at present the most widely adopted framework for programming parallel applications for distributed-memory and clustere...
Jesper Larsson Träff, William D. Gropp, Rajee...
ICTAI
2010
IEEE
13 years 4 months ago
A Semantic Similarity Language Model to Improve Automatic Image Annotation
In recent years, with the rapid proliferation of digital images, the need to search and retrieve the images accurately, efficiently, and conveniently is becoming more acute. Automa...
Tianxia Gong, Shimiao Li, Chew Lim Tan
IMC
2010
ACM
13 years 4 months ago
Network tomography on correlated links
Network tomography establishes linear relationships between the characteristics of individual links and those of end-toend paths. It has been proved that these relationships can b...
Denisa Ghita, Katerina J. Argyraki, Patrick Thiran
« Prev « First page 1114 / 1125 Last » Next »