Sciweavers

338 search results - page 46 / 68
» Perfect simulation from the Quicksort limit distribution
Sort
View
ICDCS
2009
IEEE
14 years 3 months ago
Stochastic Multicast with Network Coding
The usage of network resources by content providers is commonly governed by Service Level Agreements (SLA) between the content provider and the network service provider. Resource ...
Ajay Gopinathan, Zongpeng Li
IJCNN
2006
IEEE
14 years 2 months ago
A Monte Carlo Sequential Estimation for Point Process Optimum Filtering
— Adaptive filtering is normally utilized to estimate system states or outputs from continuous valued observations, and it is of limited use when the observations are discrete e...
Yiwen Wang 0002, António R. C. Paiva, Jose ...
JSAC
2010
188views more  JSAC 2010»
13 years 3 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
MICCAI
2002
Springer
14 years 9 months ago
A Novel Image Similarity Measure for Registration of 3-D MR Images and X-Ray Projection Images
Most existing methods for registration of three-dimensional tomographic images to two-dimensional projection images use simulated projection images and either intensity-based or fe...
Torsten Rohlfing, Calvin R. Maurer Jr.
CODES
2009
IEEE
14 years 11 days ago
TotalProf: a fast and accurate retargetable source code profiler
Profilers play an important role in software/hardware design, optimization, and verification. Various approaches have been proposed to implement profilers. The most widespread app...
Lei Gao, Jia Huang, Jianjiang Ceng, Rainer Leupers...