Sciweavers

854 search results - page 122 / 171
» Abstracting from Failure Probabilities
Sort
View
140
Voted
GLOBECOM
2007
IEEE
15 years 11 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
VTC
2007
IEEE
138views Communications» more  VTC 2007»
15 years 11 months ago
Applicability of UWB Double Directional Propagation Modeling for Evaluating UWB Transmission Performance
Abstract— This paper investigates the applicability of deterministic ultra wideband (UWB) propagation modeling for evaluating UWB system performances. The modeling explores the w...
Katsuyuki Haneda, Jun-ichi Takada, Takehiko Kobaya...
JSAI
2005
Springer
15 years 10 months ago
Learning Stochastic Logical Automaton
Abstract. This paper is concerned with algorithms for the logical generalisation of probabilistic temporal models from examples. The algorithms combine logic and probabilistic mode...
Hiroaki Watanabe, Stephen Muggleton
157
Voted
PARA
2004
Springer
15 years 10 months ago
Automatic Derivation of Linear Algebra Algorithms with Application to Control Theory
It is our belief that the ultimate automatic system for deriving linear algebra libraries should be able to generate a set of algorithms starting from the mathematical specificati...
Paolo Bientinesi, Sergey Kolos, Robert A. van de G...
GLOBECOM
2009
IEEE
15 years 8 months ago
Near-ML Detection over a Reduced Dimension Hypersphere
Abstract--In this paper, we propose a near-maximum likelihood (ML) detection method referred to as reduced dimension ML search (RD-MLS). The RD-MLS detector is based on a partition...
Jun Won Choi, Byonghyo Shim, Andrew C. Singer