Sciweavers

2941 search results - page 543 / 589
» Communication Performance Issues for Two Cluster Computers
Sort
View
IMC
2007
ACM
15 years 5 months ago
Studying wireless routing link metric dynamics
Multi-hop wireless mesh networks are increasingly being deployed for last-mile Internet access. Typically, network algorithms such as routing, channel assignment and topology cont...
Saumitra M. Das, Himabindu Pucha, Konstantina Papa...
142
Voted
NIPS
2008
15 years 4 months ago
Asynchronous Distributed Learning of Topic Models
Distributed learning is a problem of fundamental interest in machine learning and cognitive science. In this paper, we present asynchronous distributed learning algorithms for two...
Arthur Asuncion, Padhraic Smyth, Max Welling
IJNSEC
2006
78views more  IJNSEC 2006»
15 years 3 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
JSAC
2008
143views more  JSAC 2008»
15 years 3 months ago
Distributed Kalman filtering based on consensus strategies
In this paper, we consider the problem of estimating the state of a dynamical system from distributed noisy measurements. Each agent constructs a local estimate based on its own m...
Ruggero Carli, Alessandro Chiuso, Luca Schenato, S...
109
Voted
JSAC
2006
127views more  JSAC 2006»
15 years 3 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang