Sciweavers

14382 search results - page 2733 / 2877
» Time in Connectionist Models
Sort
View
128
Voted
MOBIHOC
2005
ACM
16 years 2 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...
126
Voted
SODA
2010
ACM
171views Algorithms» more  SODA 2010»
15 years 12 months ago
Coresets and Sketches for High Dimensional Subspace Approximation Problems
We consider the problem of approximating a set P of n points in Rd by a j-dimensional subspace under the p measure, in which we wish to minimize the sum of p distances from each p...
Dan Feldman, Morteza Monemizadeh, Christian Sohler...
PPOPP
2010
ACM
15 years 12 months ago
Scalable communication protocols for dynamic sparse data exchange
Many large-scale parallel programs follow a bulk synchronous parallel (BSP) structure with distinct computation and communication phases. Although the communication phase in such ...
Torsten Hoefler, Christian Siebert, Andrew Lumsdai...
132
Voted
EUROGRAPHICS
2010
Eurographics
15 years 11 months ago
Adding Depth to Cartoons Using Sparse Depth (In)equalities
This paper presents a novel interactive approach for adding depth information into hand-drawn cartoon images and animations. In comparison to previous depth assignment techniques ...
Daniel Sýkora, David Sedlacek, Sun Jinchao, John ...
142
Voted
ICCD
2008
IEEE
221views Hardware» more  ICCD 2008»
15 years 11 months ago
Reversi: Post-silicon validation system for modern microprocessors
— Verification remains an integral and crucial phase of today’s microprocessor design and manufacturing process. Unfortunately, with soaring design complexities and decreasing...
Ilya Wagner, Valeria Bertacco
« Prev « First page 2733 / 2877 Last » Next »