Sciweavers

2508 search results - page 244 / 502
» An analytic approach to stability
Sort
View
104
Voted
GLOBECOM
2009
IEEE
15 years 5 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
AINA
2008
IEEE
15 years 3 months ago
A Communication-Efficient Distributed Clustering Algorithm for Sensor Networks
Sensor networks usually generate continuous stream of data over time. Clustering sensor data as a core task of mining sensor data plays an essential role in analytical application...
Amirhosein Taherkordi, Reza Mohammadi, Frank Elias...
98
Voted
EFDBS
2001
15 years 3 months ago
Extensible Grouping and Aggregation for Data Reconciliation
New applications from the areas of analytical data processing and data integration require powerful features to condense and reconcile available data. Object-relational and other d...
Eike Schallehn, Kai-Uwe Sattler, Gunter Saake
CGF
2010
170views more  CGF 2010»
15 years 2 months ago
A Closed-Form Solution to Single Scattering for General Phase Functions and Light Distributions
Due to the intricate nature of the equation governing light transport in participating media, accurately and efficiently simulating radiative energy transfer remains very challeng...
Vincent Pegoraro, Mathias Schott, Steven G. Parker
120
Voted
CORR
2010
Springer
113views Education» more  CORR 2010»
15 years 2 months ago
A two-step fusion process for multi-criteria decision applied to natural hazards in mountains
Abstract--Mountain river torrents and snow avalanches generate human and material damages with dramatic consequences. Knowledge about natural phenomenona is often lacking and exper...
Jean-Marc Tacnet, Mireille Batton-Hubert, Jean Dez...