Sciweavers

102291 search results - page 20051 / 20459
» Computing
Sort
View
117
Voted
ADHOC
2007
109views more  ADHOC 2007»
15 years 3 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
117
Voted
ADHOC
2007
102views more  ADHOC 2007»
15 years 3 months ago
On the capacity of the single source multiple relay single destination mesh network
In this paper, we derive the information theoretic capacity of a special class of mesh networks. A mesh network is a heterogeneous wireless network in which the transmission among...
Lawrence Ong, Mehul Motani
120
Voted
AES
2008
Springer
133views Cryptology» more  AES 2008»
15 years 3 months ago
Alternative neural networks to estimate the scour below spillways
Artificial neural networks (ANN's) are associated with difficulties like lack of success in a given problem and unpredictable level of accuracy that could be achieved. In eve...
H. Md. Azamathulla, M. C. Deo, P. B. Deolalikar
148
Voted
AGIS
2008
319views more  AGIS 2008»
15 years 3 months ago
An Efficient Algorithm for Raster-to-Vector Data Conversion
Data conversion from raster to vector (R2V) is a key function in Geographic Information Systems (GIS) and remote sensing (RS) image processing for integrating GIS and RS data. The...
Junhua Teng, Fahui Wang, Yu Liu
128
Voted
AI
2010
Springer
15 years 3 months ago
Optimal query complexity bounds for finding graphs
We consider the problem of finding an unknown graph by using two types of queries with an additive property. Given a graph, an additive query asks the number of edges in a set of ...
Sung-Soon Choi, Jeong Han Kim
« Prev « First page 20051 / 20459 Last » Next »