Sciweavers

2735 search results - page 312 / 547
» Comparing notions of randomness
Sort
View
84
Voted
ICC
2008
IEEE
117views Communications» more  ICC 2008»
15 years 7 months ago
A Comprehensive Evaluation of Joint Range and Angle Estimation in Ultra-Wideband Location Systems for Indoors
— Fine time resolution enables Ultra-Wideband (UWB) ranging systems to reliably extract the first multipath arrival corresponding to the range between a transmitter and receiver...
Camillo Gentile, A. Judson Braga, Alfred Kik
ICPP
2008
IEEE
15 years 7 months ago
Scalable Techniques for Transparent Privatization in Software Transactional Memory
—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
102
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Towards Statistically Strong Source Anonymity for Sensor Networks
—For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficu...
Min Shao, Yi Yang, Sencun Zhu, Guohong Cao
MMM
2008
Springer
117views Multimedia» more  MMM 2008»
15 years 7 months ago
Distribution-Based Similarity for Multi-represented Multimedia Objects
In modern multimedia databases, objects can be represented by a large variety of feature representations. In order to employ all available information in a best possible way, a joi...
Hans-Peter Kriegel, Peter Kunath, Alexey Pryakhin,...
WCNC
2008
IEEE
15 years 7 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...