Sciweavers

11371 search results - page 2269 / 2275
» The network inhibition problem
Sort
View
ICDCS
2010
IEEE
13 years 5 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
CDC
2010
IEEE
104views Control Systems» more  CDC 2010»
13 years 2 months ago
Single timescale regularized stochastic approximation schemes for monotone Nash games under uncertainty
Abstract-- In this paper, we consider the distributed computation of equilibria arising in monotone stochastic Nash games over continuous strategy sets. Such games arise in setting...
Jayash Koshal, Angelia Nedic, Uday V. Shanbhag
CORR
2011
Springer
171views Education» more  CORR 2011»
13 years 2 months ago
Fairness issues in a chain of IEEE 802.11 stations
: We study a simple general scenario of ad hoc networks based on IEEE 802.11 wireless communications, consisting in a chain of transmitters, each of them being in the carrier sense...
Bertrand Ducourthial, Yacine Khaled, Stépha...
IDA
2011
Springer
13 years 2 months ago
Ubiquitous Knowledge Discovery
Ubiquitous Knowledge Discovery is a new research area at the intersection of machine learning and data mining with mobile and distributed systems. In this paper the main character...
João Gama, Michael May
JAIR
2011
124views more  JAIR 2011»
13 years 2 months ago
Second-Order Consistencies
In this paper, we propose a comprehensive study of second-order consistencies (i.e., consistencies identifying inconsistent pairs of values) for constraint satisfaction. We build ...
Christophe Lecoutre, Stéphane Cardon, Julie...
« Prev « First page 2269 / 2275 Last » Next »