Sciweavers

1844 search results - page 282 / 369
» Exploiting the Structure of Distributed Constraint Optimizat...
Sort
View
125
Voted
SMI
2008
IEEE
118views Image Analysis» more  SMI 2008»
15 years 9 months ago
A least-norm approach to flattenable mesh surface processing
Following the definition of developable surface in differential geometry, the flattenable mesh surface, a special type of piecewiselinear surface, inherits the good property of ...
Charlie C. L. Wang
142
Voted
IJWMC
2010
115views more  IJWMC 2010»
14 years 12 months ago
Small-world effects in wireless agent sensor networks
Coverage, fault tolerance and power consumption constraints make optimal placement of mobile sensors or other mobile agents a hard problem. We have developed a model for describin...
Kenneth A. Hawick, Heath A. James
PKDD
2010
Springer
212views Data Mining» more  PKDD 2010»
15 years 1 months ago
Cross Validation Framework to Choose amongst Models and Datasets for Transfer Learning
Abstract. One solution to the lack of label problem is to exploit transfer learning, whereby one acquires knowledge from source-domains to improve the learning performance in the t...
ErHeng Zhong, Wei Fan, Qiang Yang, Olivier Versche...
132
Voted
CN
2007
117views more  CN 2007»
15 years 2 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
164
Voted
OPODIS
2004
15 years 4 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko