Sciweavers

1086 search results - page 127 / 218
» Subspace Analysis Using Random Mixture Models
Sort
View
ACISP
2008
Springer
13 years 11 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
FMOODS
2003
13 years 10 months ago
A Rewriting Based Model for Probabilistic Distributed Object Systems
Concurrent and distributed systems have traditionally been modelled using nondeterministic transitions over configurations. The minism provides an abstraction over scheduling, net...
Nirman Kumar, Koushik Sen, José Meseguer, G...
PERVASIVE
2009
Springer
14 years 3 months ago
Methodologies for Continuous Cellular Tower Data Analysis
This paper presents novel methodologies for the analysis of continuous cellular tower data from 215 randomly sampled subjects in a major urban city. We demonstrate the potential of...
Nathan Eagle, John A. Quinn, Aaron Clauset
HICSS
1997
IEEE
107views Biometrics» more  HICSS 1997»
14 years 1 months ago
On Heuristic Mapping of Decision Surfaces for Post-Evaluation Analysis
The value for decision making of high-quality postsolution analysis of decision-supporting models can hardly be overestimated. Candle-lighting analysis (CLA) takes this notion ver...
Major Bill Branley, Russell Fradin, Steven O. Kimb...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 9 months ago
A stochastic analysis of greedy routing in a spatially-dependent sensor network
For a sensor network, as tractable spatially-dependent node deployment model is presented with the property that the density is inversely proportional to the sink distance. A stoc...
H. Paul Keeler