Sciweavers

2861 search results - page 143 / 573
» The multi-layered network design problem
Sort
View
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
15 years 11 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
KES
1998
Springer
15 years 8 months ago
Hidden partitioning of a visual feedback-based neuro-controller
Robotic controllers take advantage from neural network learning capabilities as long as the dimensionality of the problem is kept moderate. This paper explores the possibilities of...
Jean-Philippe Urban, Jean-Luc Buessler, Julien Gre...
SIROCCO
2001
15 years 5 months ago
Cycle Covering
This paper considers the design of a survivable WDM network based on covering the initial network with sub-networks, which are protected independently from each other. We focus on...
Jean-Claude Bermond, Lilian Chacon, David Coudert,...
ICMI
2000
Springer
138views Biometrics» more  ICMI 2000»
15 years 8 months ago
Multimodal Speaker Detection Using Input/Output Dynamic Bayesian Networks
Inferring users' actions and intentions forms an integral part of design and development of any human-computer interface. The presence of noisy and at times ambiguous sensory ...
Vladimir Pavlovic, Ashutosh Garg, James M. Rehg
IPSN
2010
Springer
15 years 11 months ago
Covering space for in-network sensor data storage
For in-network storage schemes, one maps data, indexed in a logical space, to the distributed sensor locations. When the physical sensor network has an irregular shape and possibl...
Rik Sarkar, Wei Zeng, Jie Gao, Xianfeng David Gu