Sciweavers

184 search results - page 36 / 37
» Data Provenance in Distributed Propagator Networks
Sort
View
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
13 years 11 months ago
MBMS Power Planning in Macro and Micro Cell Environments
Multimedia Broadcast Multicast Services (MBMS), introduced in Third Generation Partnership Project (3GPP) Release 6, is a point-to-multipoint downlink bearer service that addresse...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
TMC
2012
11 years 7 months ago
Message Drop and Scheduling in DTNs: Theory and Practice
Abstract—In order to achieve data delivery in Delay Tolerant Networks (DTN), researchers have proposed the use of store-carryand-forward protocols: a node there may store a messa...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...
CCS
2005
ACM
13 years 10 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
AAAI
2010
13 years 6 months ago
Informed Lifting for Message-Passing
Lifted inference, handling whole sets of indistinguishable objects together, is critical to the effective application of probabilistic relational models to realistic real world ta...
Kristian Kersting, Youssef El Massaoudi, Fabian Ha...
PR
2011
12 years 8 months ago
A novel multi-view learning developed from single-view patterns
The existing Multi-View Learning (MVL) learns how to process patterns with multiple information sources. In generalization this MVL is proven to have a significant advantage over...
Zhe Wang, Songcan Chen, Daqi Gao