Sciweavers

5829 search results - page 1044 / 1166
» The Practice of Cluster Analysis
Sort
View
INFOCOM
2011
IEEE
13 years 1 months ago
On the throughput scaling of Cognitive Radio ad hoc networks
Abstract—Due to the emergence of Cognitive Radio, a special type of heterogeneous networks attracts increasing interest recently, in which a secondary network composed of cogniti...
Chengzhi Li, Huaiyu Dai
ICCV
2011
IEEE
12 years 10 months ago
Real-time Indoor Scene Understanding using Bayesian Filtering with Motion Cues
We present a method whereby an embodied agent using visual perception can efficiently create a model of a local indoor environment from its experience of moving within it. Our me...
Grace Tsai, Changhai Xu, Jingen Liu, Benjamin Kuip...
ASUNAM
2011
IEEE
12 years 10 months ago
DisNet: A Framework for Distributed Graph Computation
—With the rise of network science as an exciting interdisciplinary research topic, efficient graph algorithms are in high demand. Problematically, many such algorithms measuring...
Ryan Lichtenwalter, Nitesh V. Chawla
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
12 years 10 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert
DSN
2011
IEEE
12 years 10 months ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...
« Prev « First page 1044 / 1166 Last » Next »