Sciweavers

1416 search results - page 48 / 284
» cost 2009
Sort
View
MICCAI
2009
Springer
14 years 8 months ago
Asymmetric Image-Template Registration
A natural requirement in pairwise image registration is that the resulting deformation is independent of the order of the images. This constraint is typically achieved via a symmet...
Mert R. Sabuncu, B. T. Thomas Yeo, Koen Van Leem...
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
14 years 8 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander
SOSP
2009
ACM
14 years 4 months ago
Surviving sensor network software faults
We describe Neutron, a version of the TinyOS operating system that efficiently recovers from memory safety bugs. Where existing schemes reboot an entire node on an error, Neutron...
Yang Chen, Omprakash Gnawali, Maria A. Kazandjieva...
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
13 years 5 months ago
Optimal control in two-hop relay routing
We study the optimal control of propagation of packets in delay tolerant mobile ad-hoc networks. We consider a two-hop forwarding policy under which the expected number of nodes ca...
Eitan Altman, Tamer Basar, Francesco De Pellegrini
PODS
2009
ACM
110views Database» more  PODS 2009»
14 years 8 months ago
Optimal tracking of distributed heavy hitters and quantiles
We consider the the problem of tracking heavy hitters and quantiles in the distributed streaming model. The heavy hitters and quantiles are two important statistics for characteri...
Ke Yi, Qin Zhang