Sciweavers

8655 search results - page 1173 / 1731
» Challenges for Trusted Computing
Sort
View
APSCC
2007
IEEE
15 years 5 months ago
Joint Sink Mobility and Data Diffusion for Lifetime Optimization in Wireless Sensor Networks
Abstract— In this paper, we address the problem of lifetime optimization under storage constraint for wireless sensor networks with a mobile sink node. The problem is particularl...
Yu Gu, Hengchang Liu, Fei Song, Baohua Zhao
CISS
2008
IEEE
15 years 5 months ago
Detection of anomalous meetings in a social network
Abstract-- When monitoring interactions within a social network, meetings or contacts between different members of the network are recorded. This paper addresses the problem of usi...
Jorge Silva, Rebecca Willett
152
Voted
AUTOMATICA
2008
116views more  AUTOMATICA 2008»
15 years 5 months ago
A dynamical systems approach to weighted graph matching
Graph matching is a fundamental problem that arises frequently in the areas of distributed control, computer vision, and facility allocation. In this paper, we consider the optimal...
Michael M. Zavlanos, George J. Pappas
160
Voted
CACM
2008
96views more  CACM 2008»
15 years 5 months ago
The provenance of electronic data
In the study of fine art, provenance refers to the documented history of some art object. Given that documented history, the object attains an authority that allows scholars to ap...
Luc Moreau, Paul T. Groth, Simon Miles, Javier V&a...
CGF
2010
170views more  CGF 2010»
15 years 5 months ago
A Closed-Form Solution to Single Scattering for General Phase Functions and Light Distributions
Due to the intricate nature of the equation governing light transport in participating media, accurately and efficiently simulating radiative energy transfer remains very challeng...
Vincent Pegoraro, Mathias Schott, Steven G. Parker
« Prev « First page 1173 / 1731 Last » Next »