Sciweavers

1281 search results - page 239 / 257
» Transliteration as Constrained Optimization
Sort
View
IJSN
2008
145views more  IJSN 2008»
13 years 7 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
CONCURRENCY
2002
230views more  CONCURRENCY 2002»
13 years 7 months ago
Economic models for resource management and scheduling in Grid computing
: The accelerated development in Peer-to-Peer (P2P) and Grid computing has positioned them as promising next generation computing platforms. They enable the creation of Virtual Ent...
Rajkumar Buyya, David Abramson, Jonathan Giddy, He...
PAMI
2007
186views more  PAMI 2007»
13 years 6 months ago
Value-Directed Human Behavior Analysis from Video Using Partially Observable Markov Decision Processes
—This paper presents a method for learning decision theoretic models of human behaviors from video data. Our system learns relationships between the movements of a person, the co...
Jesse Hoey, James J. Little
CNSM
2010
13 years 5 months ago
DP+IP = design of efficient backup scheduling
Many industries experience an explosion in digital content. This explosion of electronic documents, along with new regulations and document retention rules, sets new requirements f...
Ludmila Cherkasova, Alex Zhang, Xiaozhou Li
MASS
2010
13 years 5 months ago
Geography-aware active data dissemination in mobile social networks
Abstract--In mobile social networks (MSNets), data dissemination is an important topic, which has not been widely investigated yet. Active data dissemination is a networking paradi...
Jialu Fan, Yuan Du, Wei Gao, Jiming Chen, Youxian ...