Sciweavers

634 search results - page 88 / 127
» Some observations on bitTorrent performance
Sort
View
ICITS
2009
13 years 5 months ago
Cryptanalysis of Secure Message Transmission Protocols with Feedback
In the context of secure point-to-point message transmission in networks with minimal connectivity, previous studies showed that feedbacks from the receiver to the sender can be us...
Qiushi Yang, Yvo Desmedt
ITIIS
2010
158views more  ITIIS 2010»
13 years 2 months ago
Development of a Dynamic Collision Avoidance Algorithm for Indoor Tracking System Based on Active RFID
We propose a novel collision-avoidance algorithm for the active type RFID regarding an indoor tracking system. Several well-known collision avoidance algorithms are analyzed consi...
Sekyung Han, Yeonsuk Choi, Masayuki Iwai, Kaoru Se...
JMLR
2010
191views more  JMLR 2010»
13 years 2 months ago
Noise-contrastive estimation: A new estimation principle for unnormalized statistical models
We present a new estimation principle for parameterized statistical models. The idea is to perform nonlinear logistic regression to discriminate between the observed data and some...
Michael Gutmann, Aapo Hyvärinen
SIAMIS
2010
138views more  SIAMIS 2010»
13 years 2 months ago
Multiscale Photon-Limited Spectral Image Reconstruction
Abstract. This paper studies photon-limited spectral intensity estimation and proposes a spatially and spectrally adaptive, nonparametric method for estimating spectral intensities...
Kalyani Krishnamurthy, Maxim Raginsky, Rebecca Wil...
TSE
2010
230views more  TSE 2010»
13 years 2 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...