Sciweavers

5448 search results - page 977 / 1090
» Breakpoints and Time in Distributed Computations
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 2 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
108
Voted
ISCAPDCS
2003
15 years 2 months ago
Optimal Graph Transformation Assuming Alternate Scheduling Models
Many computation-intensive iterative or recursive applications commonly found in digital signal processing and image processing applications can be represented by data-flow graph...
Timothy W. O'Neil
91
Voted
OPODIS
2003
15 years 2 months ago
Transformations for Write-All-with-Collision Model
Dependable properties such as self-stabilization are crucial requirements in sensor networks. One way to achieve these properties is to utilize the vast literature on distributed ...
Sandeep S. Kulkarni, Umamaheswaran Arumugam
AAAI
1996
15 years 2 months ago
Building Classifiers Using Bayesian Networks
Recent work in supervised learning has shown that a surprisingly simple Bayesian classifier with strong assumptions of independence among features, called naive Bayes, is competit...
Nir Friedman, Moisés Goldszmidt
84
Voted
WCE
2007
15 years 1 months ago
Exploring the Interdependencies among Communication, Knowledgeability and Performance of Multi-agent Systems
— The advent of ubiquitous computing has revolutionized distributed Multi-agent systems (MAS). Consequently, there are many software projects focusing on MASs. However, its succe...
Punam Bedi, Vibha Gaur