Sciweavers

9176 search results - page 1807 / 1836
» algorithms 2010
Sort
View
TIFS
2010
186views more  TIFS 2010»
13 years 9 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
TKDE
2010
182views more  TKDE 2010»
13 years 9 months ago
MILD: Multiple-Instance Learning via Disambiguation
In multiple-instance learning (MIL), an individual example is called an instance and a bag contains a single or multiple instances. The class labels available in the training set ...
Wu-Jun Li, Dit-Yan Yeung
TKDE
2010
184views more  TKDE 2010»
13 years 9 months ago
The Dynamic Bloom Filters
—A Bloom filter is an effective, space-efficient data structure for concisely representing a set, and supporting approximate membership queries. Traditionally, the Bloom filter a...
Deke Guo, Jie Wu, Honghui Chen, Ye Yuan, Xueshan L...
TMC
2010
138views more  TMC 2010»
13 years 9 months ago
Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks
—One important application of cooperative communications is to extend coverage area in wireless networks without increasing infrastructure. However, a crucial challenge in implem...
Ahmed K. Sadek, Zhu Han, K. J. Ray Liu
TMC
2010
150views more  TMC 2010»
13 years 9 months ago
Handling Mobility in Wireless Sensor and Actor Networks
— In Wireless Sensor and Actor Networks (WSANs), the collaborative operation of sensors enables the distributed sensing of a physical phenomenon, while actors collect and process...
Tommaso Melodia, Dario Pompili, Ian F. Akyildiz
« Prev « First page 1807 / 1836 Last » Next »