Sciweavers

7978 search results - page 326 / 1596
» Combining shared-coin algorithms
Sort
View
ICWN
2009
15 years 2 months ago
Wireless Sensor Network Localization With Imprecise Measurements Using Only a Quadratic Solver
The energy constrained wireless sensor nodes need very efficient localization algorithm for event detection. We propose a method for localizing the wireless sensor nodes using the ...
Maneesha V. Ramesh, K. P. Soman
AISS
2010
155views more  AISS 2010»
15 years 2 months ago
An Adaptive HW/SW Dual Communication Mode
HW/SW communication mode makes significant impact on HW/SW communication efficiency. Based on the characteristics of the hardware functions, this paper presents an adaptive HW/SW ...
Wang-xian Yang, Dong-hua Liu, Ding-ju Zhu
CONSTRAINTS
2010
116views more  CONSTRAINTS 2010»
15 years 2 months ago
Enabling local computation for partially ordered preferences
Abstract. Many computational problems linked to uncertainty and preference management can be expressed in terms of computing the marginal(s) of a combination of a collection of val...
Hélène Fargier, Emma Rollon, Nic Wil...
108
Voted
ECEASST
2010
15 years 2 months ago
Assemblies as Graph Processes
This short paper explores the potential of embedding-based graph rewriting as a tool for understanding natural computing, and in particular self-assembly. The basic point of view i...
Dirk Janssens
FI
2010
130views more  FI 2010»
15 years 2 months ago
Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures
: Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown...
Martin Güthle, Jochen Kögel, Stefan Wahl...