Sciweavers

89222 search results - page 17726 / 17845
» Which
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
13 years 1 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
ADHOC
2011
13 years 1 months ago
RadiaLE: A framework for designing and assessing link quality estimators in wireless sensor networks
—Stringent cost and energy constraints impose the use of low-cost and low-power radio transceivers in large-scale wireless sensor networks (WSNs). This fact, together with the ha...
Nouha Baccour, Anis Koubaa, Maissa Ben Jamâa...
AIPS
2011
13 years 1 months ago
Cross-Domain Action-Model Acquisition for Planning via Web Search
Applying learning techniques to acquire action models is an area of intense research interest. Most previous works in this area have assumed that there is a significant amount of...
Hankz Hankui Zhuo, Qiang Yang, Rong Pan, Lei Li
APN
2011
Springer
13 years 1 months ago
On the Origin of Events: Branching Cells as Stubborn Sets
In prime event structures with binary conflicts (pes-bc)3 a branching cell [1] is a subset of events closed under downward causality and immediate conflict relations. This means ...
Henri Hansen, Xu Wang
ASPDAC
2011
ACM
167views Hardware» more  ASPDAC 2011»
13 years 1 months ago
Variation-tolerant and self-repair design methodology for low temperature polycrystalline silicon liquid crystal and organic lig
- In low temperature polycrystalline silicon (LTPS) based display technologies, the electrical parameter variations in thin film transistors (TFTs) caused by random grain boundarie...
Chih-Hsiang Ho, Chao Lu, Debabrata Mohapatra, Kaus...
« Prev « First page 17726 / 17845 Last » Next »