Sciweavers

24188 search results - page 4797 / 4838
» Computing on Encrypted Data
Sort
View
JSAC
2006
102views more  JSAC 2006»
14 years 10 months ago
A deterministic frequency-domain model for the indoor power line transfer function
The characterization of the transfer function of the power line (PL) channel is a nontrivial task that requires a truly interdisciplinary approach. Until recently, a common attribu...
S. Galli, Thomas C. Banwell
ENTCS
2007
116views more  ENTCS 2007»
14 years 10 months ago
Experiments in Cost Analysis of Java Bytecode
Recently, we proposed a general framework for the cost analysis of Java bytecode which can be used for measuring resource usage. This analysis generates, at compile-time, cost rel...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
JUCS
2006
117views more  JUCS 2006»
14 years 10 months ago
Resource Efficient Maintenance of Wireless Network Topologies
Abstract: Multiple hop routing in mobile ad hoc networks can minimize energy consumption and increase data throughput. Yet, the problem of radio interferences remain. However if th...
Tamás Lukovszki, Christian Schindelhauer, K...
MCS
2006
Springer
14 years 10 months ago
A phase-field method for interface-tracking simulation of two-phase flows
For interface-tracking simulation of two-phase flows, we propose a new computational method, NS-PFM, combining Navier-Stokes (NS) equations with phase-field model (PFM). Based on ...
Naoki Takada, Masaki Misawa, Akio Tomiyama
ML
2006
ACM
143views Machine Learning» more  ML 2006»
14 years 10 months ago
Mathematical applications of inductive logic programming
The application of Inductive Logic Programming to scientific datasets has been highly successful. Such applications have led to breakthroughs in the domain of interest and have dri...
Simon Colton, Stephen Muggleton
« Prev « First page 4797 / 4838 Last » Next »