Sciweavers

1010 search results - page 36 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
JUCS
2008
107views more  JUCS 2008»
14 years 11 months ago
Metaclasses and Zoning Mechanism Applied to Handwriting Recognition
: The contribution of this paper is twofold. First we investigate the use of the confusion matrices in order to get some insight to better define perceptual zoning for character re...
Cinthia Obladen de Almendra Freitas, Luiz S. Olive...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 5 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 6 months ago
Scalable Fault Diagnosis in IP Networks using Graphical Models: A Variational Inference Approach
In this paper we investigate the fault diagnosis problem in IP networks. We provide a lower bound on the average number of probes per edge using variational inference technique pro...
Rajesh Narasimha, Souvik Dihidar, Chuanyi Ji, Stev...
CORR
2008
Springer
172views Education» more  CORR 2008»
14 years 12 months ago
Altruism in Congestion Games
This paper studies the effects of introducing altruistic agents into atomic congestion games. Altruistic behavior is modeled by a trade-off between selfish and social objectives. ...
Martin Hoefer, Alexander Skopalik
EDCC
2008
Springer
15 years 1 months ago
Targeted Distribution of Resource Allocation for Backup LSP Computation
Under the hypothesis of single failures in the network, some backup paths cannot be active at the same time because they protect against the failure of different components. Hence...
Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le ...