Sciweavers

11488 search results - page 2254 / 2298
» Robust optimization - methodology and applications
Sort
View
155
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
Isolated Proofs of Knowledge and Isolated Zero Knowledge
We introduce a new notion called -isolated proofs of knowledge ( -IPoK). These are proofs of knowledge where a cheating prover is allowed to exchange up to bits of communication wi...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...
187
Voted
FMSB
2008
199views Formal Methods» more  FMSB 2008»
15 years 5 months ago
Bounded Asynchrony: Concurrency for Modeling Cell-Cell Interactions
We introduce bounded asynchrony, a notion of concurrency tailored to the modeling of biological cell-cell interactions. Bounded asynchrony is the result of a scheduler that bounds ...
Jasmin Fisher, Thomas A. Henzinger, Maria Mateescu...
123
Voted
CIDR
2007
141views Algorithms» more  CIDR 2007»
15 years 5 months ago
Data-Driven Processing in Sensor Networks
Wireless sensor networks are poised to enable continuous data collection on unprecedented scales, in terms of area location and size, and frequency. This is a great boon to field...
Adam Silberstein, Gregory Filpus, Kamesh Munagala,...
124
Voted
MASCOTS
2007
15 years 4 months ago
Distance Reduction in Mobile Wireless Communication: Lower Bound Analysis and Practical Attainment
— The transmission energy required for a wireless communication increases superlinearly with the communication distance. In a mobile wireless network, nodal movement can be explo...
Yu Dong, Wing-Kai Hon, David K. Y. Yau, Jren-Chit ...
SDM
2008
SIAM
138views Data Mining» more  SDM 2008»
15 years 4 months ago
Learning Markov Network Structure using Few Independence Tests
In this paper we present the Dynamic Grow-Shrink Inference-based Markov network learning algorithm (abbreviated DGSIMN), which improves on GSIMN, the state-ofthe-art algorithm for...
Parichey Gandhi, Facundo Bromberg, Dimitris Margar...
« Prev « First page 2254 / 2298 Last » Next »