Sciweavers

3458 search results - page 478 / 692
» Abstracting Control
Sort
View
SSS
2010
Springer
154views Control Systems» more  SSS 2010»
15 years 2 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...
WIOPT
2010
IEEE
15 years 2 months ago
Resource allocation for cross-layer utility maximization in multi-hop wireless networks in the presence of self interference
Abstract—The cross-layer utility maximization problem subject to stability constraints is considered for a multi-hop wireless network. A time slotted network, where the channel g...
Chathuranga Weeraddana, Marian Codreanu, Matti Lat...
DAGM
2009
Springer
15 years 2 months ago
Combined GKLT Feature Tracking and Reconstruction for Next Best View Planning
Abstract. Guided Kanade-Lucas-Tomasi (GKLT) tracking is a suitable way to incorporate knowledge about camera parameters into the standard KLT tracking approach for feature tracking...
Michael Trummer, Christoph Munkelt, Joachim Denzle...
JSAC
2010
153views more  JSAC 2010»
14 years 11 months ago
Autonomic traffic engineering for network robustness
Abstract--The continuously increasing complexity of communication networks and the increasing diversity and unpredictability of traffic demand has led to a consensus view that the ...
Ali Tizghadam, Alberto Leon-Garcia
TON
2010
161views more  TON 2010»
14 years 11 months ago
Investigating Self-Similarity and Heavy-Tailed Distributions on a Large-Scale Experimental Facility
Abstract--After the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed distributions, a number of research articles verified that aggregated Internet traffic time...
Patrick Loiseau, Paulo Gonçalves, Guillaume...