Sciweavers

24529 search results - page 4885 / 4906
» Computing on Authenticated Data
Sort
View
130
Voted
INFOCOM
2010
IEEE
15 years 10 days ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
INFORMATICALT
2010
122views more  INFORMATICALT 2010»
15 years 10 days ago
On a Time-Varying Parameter Adaptive Self-Organizing System in the Presence of Large Outliers in Observations
In the previous papers (Pupeikis, 2000; Genov et al., 2006; Atanasov and Pupeikis, 2009), a direct approach for estimating the parameters of a discrete-time linear time-invariant (...
Rimantas Pupeikis
JACM
2010
137views more  JACM 2010»
15 years 10 days ago
Reconciling description logics and rules
Description logics (DLs) and rules are formalisms that emphasize different aspects of knowledge representation: whereas DLs are focused on specifying and reasoning about conceptual...
Boris Motik, Riccardo Rosati
125
Voted
JAIR
2010
162views more  JAIR 2010»
15 years 10 days ago
Text Relatedness Based on a Word Thesaurus
The computation of relatedness between two fragments of text in an automated manner requires taking into account a wide range of factors pertaining to the meaning the two fragment...
George Tsatsaronis, Iraklis Varlamis, Michalis Vaz...
JCST
2010
119views more  JCST 2010»
15 years 10 days ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
« Prev « First page 4885 / 4906 Last » Next »