Sciweavers

4076 search results - page 393 / 816
» A framework for developing distributed location based applic...
Sort
View
JSAC
2010
107views more  JSAC 2010»
15 years 3 months ago
Online learning in autonomic multi-hop wireless networks for transmitting mission-critical applications
Abstract—In this paper, we study how to optimize the transmission decisions of nodes aimed at supporting mission-critical applications, such as surveillance, security monitoring,...
Hsien-Po Shiang, Mihaela van der Schaar
IPPS
2009
IEEE
15 years 11 months ago
Network awareness of P2P live streaming applications
Abstract—Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about ...
Delia Ciullo, M.-A. Garcia da Rocha Neta, Á...
153
Voted
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
15 years 10 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
ECCV
2000
Springer
16 years 6 months ago
A Physically-Based Statistical Deformable Model for Brain Image Analysis
A probabilistic deformable model for the representation of brain structures is described. The statistically learned deformable model represents the relative location of head (skull...
Christophoros Nikou, Fabrice Heitz, Jean-Paul Arms...
IPPS
2008
IEEE
15 years 11 months ago
A modeling approach for estimating execution time of long-running scientific applications
In a Grid computing environment, resources are shared among a large number of applications. Brokers and schedulers find matching resources and schedule the execution of the applic...
Seyed Masoud Sadjadi, Shu Shimizu, Javier Figueroa...