Sciweavers

1984 search results - page 318 / 397
» Binary Component Adaptation
Sort
View
TROB
2002
244views more  TROB 2002»
15 years 3 months ago
Distributed surveillance and reconnaissance using multiple autonomous ATVs: CyberScout
The objective of the CyberScout project is to develop an autonomous surveillance and reconnaissance system using a network of all-terrain vehicles. In this paper, we focus on two f...
Mahesh Saptharishi, C. Spence Oliver, Christopher ...
EMSOFT
2010
Springer
15 years 1 months ago
TeleScribe: a scalable, resumable wireless reprogramming approach
TeleScribe is a software mechanism for efficiently reprogramming embedded systems such as wireless sensor nodes over a shared communication link. One distinguishing feature is its...
Min-Hua Chen, Pai H. Chou
TNN
2010
234views Management» more  TNN 2010»
14 years 10 months ago
Novel maximum-margin training algorithms for supervised neural networks
This paper proposes three novel training methods, two of them based on the back-propagation approach and a third one based on information theory for Multilayer Perceptron (MLP) bin...
Oswaldo Ludwig, Urbano Nunes
TON
2010
157views more  TON 2010»
14 years 10 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
IACR
2011
127views more  IACR 2011»
14 years 3 months ago
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
Secure multiparty computation (MPC) allows a set of n players to compute any public function, given as an arithmetic circuit, on private inputs, so that privacy of the inputs as we...
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky