Sciweavers

905 search results - page 133 / 181
» Public key distribution through
Sort
View
JIRS
2006
113views more  JIRS 2006»
13 years 8 months ago
Using Virtual Pheromones and Cameras for Dispersing a Team of Multiple Miniature Robots
To safely and efficiently guide personnel of search and rescue operations in disaster areas, swift gathering of relevant information such as the locations of victims, must occur. U...
Janice L. Pearce, Bob Powers, Chistopher Hess, Pau...
JMLR
2006
136views more  JMLR 2006»
13 years 8 months ago
Optimising Kernel Parameters and Regularisation Coefficients for Non-linear Discriminant Analysis
In this paper we consider a novel Bayesian interpretation of Fisher's discriminant analysis. We relate Rayleigh's coefficient to a noise model that minimises a cost base...
Tonatiuh Peña Centeno, Neil D. Lawrence
ENTCS
2007
140views more  ENTCS 2007»
13 years 8 months ago
Secured Information Flow for Asynchronous Sequential Processes
We present in this article a precise security model for data confidentiality in the framework of ASP (Asynchronous Sequential Processes). ASP is based on active objects, asynchro...
Isabelle Attali, Denis Caromel, Ludovic Henrio, Fe...
JSAC
2006
120views more  JSAC 2006»
13 years 8 months ago
A Tutorial on Cross-Layer Optimization in Wireless Networks
This tutorial paper overviews recent developments in optimization-based approaches for resource allocation problems in wireless systems. We begin by overviewing important results i...
Xiaojun Lin, Ness B. Shroff, R. Srikant
JUCS
2006
103views more  JUCS 2006»
13 years 8 months ago
An Object Model for Interoperable Systems
Abstract: Most modern computer applications should run on heterogeneous platforms and, moreover, objects and respective code should be easily interchangeable between distinct platf...
Alcides Calsavara, Aaron Borges, Leonardo Nunes, D...