Sciweavers

7683 search results - page 1481 / 1537
» Distributed Computing with the CLAN Network
Sort
View
139
Voted
COMCOM
2008
91views more  COMCOM 2008»
15 years 3 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
227
Voted
AUTOMATICA
2006
140views more  AUTOMATICA 2006»
15 years 3 months ago
On a stochastic sensor selection algorithm with applications in sensor scheduling and sensor coverage
In this note we consider the following problem. Suppose a set of sensors is jointly trying to estimate a process. One sensor takes a measurement at every time step and the measure...
Vijay Gupta, Timothy H. Chung, Babak Hassibi, Rich...
JMLR
2008
94views more  JMLR 2008»
15 years 3 months ago
Using Markov Blankets for Causal Structure Learning
We show how a generic feature selection algorithm returning strongly relevant variables can be turned into a causal structure learning algorithm. We prove this under the Faithfuln...
Jean-Philippe Pellet, André Elisseeff
JCNS
2006
59views more  JCNS 2006»
15 years 3 months ago
Spatio-temporal filtering properties of a dendritic cable with active spines: A modeling study in the spike-diffuse-spike framew
The spike-diffuse-spike (SDS) model describes a passive dendritic tree with active dendritic spines. Spine-head dynamics is modeled with a simple integrate-and-fire process, whils...
Yulia Timofeeva, Gabriel J. Lord, Stephen Coombes
112
Voted
JCP
2006
100views more  JCP 2006»
15 years 3 months ago
A Local Enumeration Protocol in Spite of Corrupted Data
We present a novel self-stabilizing version of Mazurkiewicz enumeration algorithm [1]. The initial version is based on local rules to enumerate nodes on an anonymous network. [2] p...
Brahim Hamid, Mohamed Mosbah
« Prev « First page 1481 / 1537 Last » Next »