Sciweavers

12257 search results - page 2105 / 2452
» Analysis of Algorithms
Sort
View
SRDS
2007
IEEE
15 years 10 months ago
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. ...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
130
Voted
TASE
2007
IEEE
15 years 10 months ago
Realizing Live Sequence Charts in SystemVerilog
The design of an embedded control system starts with an investigation of properties and behaviors of the process evolving within its environment, and an analysis of the requiremen...
Hai H. Wang, Shengchao Qin, Jun Sun 0001, Jin Song...
VTC
2007
IEEE
15 years 10 months ago
Power Optimization of IDMA Systems with Different Target BER Constraints
— Interleave Division Multiple Access (IDMA) is a promising air interface for future wireless networks. Optimization of access schemes regarding cross user aspects is also a topi...
Petra Weitkemper, Karl-Dirk Kammeyer
164
Voted
AAMAS
2007
Springer
15 years 10 months ago
Networks of Learning Automata and Limiting Games
Learning Automata (LA) were recently shown to be valuable tools for designing Multi-Agent Reinforcement Learning algorithms. One of the principal contributions of LA theory is that...
Peter Vrancx, Katja Verbeeck, Ann Nowé
ADBIS
2007
Springer
145views Database» more  ADBIS 2007»
15 years 10 months ago
A Method for Comparing Self-organizing Maps: Case Studies of Banking and Linguistic Data
The method of self-organizing maps (SOM) is a method of exploratory data analysis used for clustering and projecting multi-dimensional data into a lower-dimensional space to reveal...
Toomas Kirt, Ene Vainik, Leo Vohandu
« Prev « First page 2105 / 2452 Last » Next »