Sciweavers

4345 search results - page 612 / 869
» Temporal Constraint Networks
Sort
View
128
Voted
MOBISYS
2011
ACM
14 years 5 months ago
Using mobile phones to write in air
The ability to note down small pieces of information, quickly and easily, can be useful. This paper proposes a system called PhonePoint Pen that uses the in-built accelerometer in...
Sandip Agrawal, Ionut Constandache, Shravan Gaonka...
234
Voted
CADE
2011
Springer
14 years 2 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
141
Voted
DSN
2011
IEEE
14 years 2 months ago
Cross-layer resilience using wearout aware design flow
—As process technology shrinks devices, circuits experience accelerated wearout. Monitoring wearout will be critical for improving the efficiency of error detection and correctio...
Bardia Zandian, Murali Annavaram
147
Voted
TSP
2012
13 years 10 months ago
Distributed Covariance Estimation in Gaussian Graphical Models
—We consider distributed estimation of the inverse covariance matrix in Gaussian graphical models. These models factorize the multivariate distribution and allow for efficient d...
Ami Wiesel, Alfred O. Hero
112
Voted
INFOCOM
2005
IEEE
15 years 8 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...