Sciweavers

1844 search results - page 282 / 369
» Exploiting the Structure of Distributed Constraint Optimizat...
Sort
View
SMI
2008
IEEE
118views Image Analysis» more  SMI 2008»
15 years 5 months ago
A least-norm approach to flattenable mesh surface processing
Following the definition of developable surface in differential geometry, the flattenable mesh surface, a special type of piecewiselinear surface, inherits the good property of ...
Charlie C. L. Wang
IJWMC
2010
115views more  IJWMC 2010»
14 years 8 months ago
Small-world effects in wireless agent sensor networks
Coverage, fault tolerance and power consumption constraints make optimal placement of mobile sensors or other mobile agents a hard problem. We have developed a model for describin...
Kenneth A. Hawick, Heath A. James
PKDD
2010
Springer
212views Data Mining» more  PKDD 2010»
14 years 9 months ago
Cross Validation Framework to Choose amongst Models and Datasets for Transfer Learning
Abstract. One solution to the lack of label problem is to exploit transfer learning, whereby one acquires knowledge from source-domains to improve the learning performance in the t...
ErHeng Zhong, Wei Fan, Qiang Yang, Olivier Versche...
CN
2007
117views more  CN 2007»
14 years 11 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
OPODIS
2004
15 years 22 days ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko