Sciweavers

6906 search results - page 62 / 1382
» An algorithm for modelling key terms
Sort
View
ICWS
2007
IEEE
15 years 5 months ago
A Model to support SPKI Federations management through XKMS
The purpose of the XML Key Management Specification (XKMS) is to facilitate the use of a Public Key Infrastructure (PKI) by transferring the complexity associated with PKI to a t...
Michelle S. Wangham, Emerson Ribeiro de Mello, Jon...
ICASSP
2010
IEEE
15 years 4 months ago
Algorithms for robust linear regression by exploiting the connection to sparse signal recovery
In this paper, we develop algorithms for robust linear regression by leveraging the connection between the problems of robust regression and sparse signal recovery. We explicitly ...
Yuzhe Jin, Bhaskar D. Rao
149
Voted
MOBIHOC
2007
ACM
16 years 3 months ago
Approximation algorithms for longest-lived directional multicast communications in WANETs
Several centralized and distributed algorithms have been recently proposed to maximize the multicast lifetime for directional communications in wireless ad-hoc networks. Their per...
Song Guo, Oliver W. W. Yang, Victor C. M. Leung
145
Voted
IAJIT
2010
99views more  IAJIT 2010»
15 years 2 months ago
Hybrid computing algorithm in representing solid model
: This paper presents an algorithm, which is a hybrid-computing algorithm in representing solid model. The proposed algorithm contains two steps namely reconstruction and represent...
Muhammad Matondang, Habibollah Haron
139
Voted
TISSEC
2008
202views more  TISSEC 2008»
15 years 3 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning