Sciweavers

1450 search results - page 52 / 290
» Common knowledge revisited
Sort
View
TON
2010
93views more  TON 2010»
14 years 4 months ago
On the Validity of IEEE 802.11 MAC Modeling Hypotheses
We identify common hypotheses on which a large number of distinct mathematical models of WLANs employing IEEE 802.11 are founded. Using data from an experimental test bed and packe...
K. D. Huang, Ken R. Duffy, David Malone
CCS
2009
ACM
15 years 10 months ago
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary
In this paper, we re-visit the problem of unconditionally secure message transmission (USMT) from a sender S to a receiver R, who are part of a distributed synchronous network, mo...
Kannan Srinathan, Arpita Patra, Ashish Choudhary, ...
ICS
2010
Tsinghua U.
15 years 7 months ago
A New Look at Selfish Routing
: We revisit price of anarchy in network routing, in a new model in which routing decisions are made by self-interested components of the network, as opposed to by the flows as in ...
Christos Papadimitriou, Gregory Valiant
MLG
2007
Springer
15 years 3 months ago
Abductive Stochastic Logic Programs for Metabolic Network Inhibition Learning
Abstract. We revisit an application developed originally using Inductive Logic Programming (ILP) by replacing the underlying Logic Program (LP) description with Stochastic Logic Pr...
Jianzhong Chen, Stephen Muggleton, Jose Santos
AVSS
2006
IEEE
15 years 3 months ago
Dissecting the Image of the Absolute Conic
In this paper, we revisit the role of the image of the absolute conic (IAC) in recovering the camera geometry. We derive new constraints on IAC that advance our understanding of i...
Imran N. Junejo, Hassan Foroosh