Sciweavers

3820 search results - page 276 / 764
» Bounded Model Debugging
Sort
View
CGF
2007
165views more  CGF 2007»
15 years 3 months ago
Ray-Casted BlockMaps for Large Urban Models Visualization
We introduce a GPU-friendly technique that efficiently exploits the highly structured nature of urban environments to ensure rendering quality and interactive performance of city...
Paolo Cignoni, Marco Di Benedetto, Fabio Ganovelli...
WS
2006
ACM
15 years 9 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
CORR
2010
Springer
100views Education» more  CORR 2010»
15 years 2 months ago
Secret Key Generation for a Pairwise Independent Network Model
Abstract— We investigate secret key generation for a “pairwise independent network” model in which every pair of terminals observes correlated sources which are independent o...
Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Pr...
AII
1992
15 years 8 months ago
Learning from Multiple Sources of Inaccurate Data
Most theoretical models of inductive inference make the idealized assumption that the data available to a learner is from a single and accurate source. The subject of inaccuracies ...
Ganesh Baliga, Sanjay Jain, Arun Sharma
TIT
2010
146views Education» more  TIT 2010»
14 years 10 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener