Sciweavers

7741 search results - page 1446 / 1549
» Security in Active Networks
Sort
View
QUESTA
2007
117views more  QUESTA 2007»
15 years 3 months ago
Estimating tail probabilities of heavy tailed distributions with asymptotically zero relative error
Efficient estimation of tail probabilities involving heavy tailed random variables is amongst the most challenging problems in Monte-Carlo simulation. In the last few years, appli...
Sandeep Juneja
INFOCOM
2010
IEEE
15 years 2 months ago
Distributed Power Control for Cognitive User Access based on Primary Link Control Feedback
—We venture beyond the “listen-before-talk” strategy that is common in many traditional cognitive radio access schemes. We exploit the bi-directional nature of most primary c...
Senhua Huang, Xin Liu, Zhi Ding
JSAC
2010
147views more  JSAC 2010»
15 years 2 months ago
Joint identity-message coding
In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as ...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...
JUCS
2010
119views more  JUCS 2010»
15 years 2 months ago
Typology of Service Innovation from Service-Dominant Logic Perspective
: This study provides a conceptual framework with respect to service innovation, especially from a service-dominant logic (S-D logic) perspective. Even though innovation has been d...
Kichan Nam, Nam Hee Lee
PRL
2010
130views more  PRL 2010»
15 years 2 months ago
Automatic configuration of spectral dimensionality reduction methods
In this paper, our main contribution is a framework for the automatic configuration of any spectral dimensionality reduction methods. This is achieved, first, by introducing the m...
Michal Lewandowski, Dimitrios Makris, Jean-Christo...
« Prev « First page 1446 / 1549 Last » Next »