Sciweavers

2092 search results - page 140 / 419
» A Theory of Non-Deterministic Networks
Sort
View
ICIP
2005
IEEE
15 years 5 months ago
Using Tsallis entropy into a Bayesian network for CBIR
This paper presents a Bayesian Network model for ContentBased Image Retrieval (CBIR). In the explanation and test of this work, only two images features (semantic evidences) are i...
Paulo S. Rodrigues, Gilson A. Giraldi, Ade A. Arau...
SIGMETRICS
2004
ACM
107views Hardware» more  SIGMETRICS 2004»
15 years 5 months ago
On zone-balancing of peer-to-peer networks: analysis of random node join
Balancing peer-to-peer graphs, including zone-size distributions, has recently become an important topic of peer-topeer (P2P) research [1], [2], [6], [19], [31], [36]. To bring an...
Xiaoming Wang, Yueping Zhang, Xiafeng Li, Dmitri L...
CDC
2009
IEEE
259views Control Systems» more  CDC 2009»
15 years 4 months ago
Comparison of stability characterisations for networked control systems
— This paper presents linear matrix inequalities for stability analysis for networked control systems (NCSs) that incorporates various network phenomena: time-varying sampling in...
Laurentiu Hetel, Marieke B. G. Cloosterman, Nathan...
PODC
2009
ACM
15 years 4 months ago
Brief announcement: locality-based aggregate computation in wireless sensor networks
We present DRR-gossip, an energy-efficient and robust aggregate computation algorithm in wireless sensor networks. We prove that the DRR-gossip algorithm requires O(n) messages a...
Jen-Yeu Chen, Gopal Pandurangan, Jianghai Hu
CSFW
2000
IEEE
15 years 3 months ago
Towards Automatic Verification of Authentication Protocols on an Unbounded Network
Schneider's work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only wit...
James Heather, Steve Schneider