Sciweavers

1513 search results - page 73 / 303
» Fibonacci Correction Networks
Sort
View
FUIN
2007
99views more  FUIN 2007»
15 years 4 months ago
Verifying Security Protocols Modelled by Networks of Automata
In this paper we show a novel method for modelling behaviours of security protocols using networks of communicating automata in order to verify them with SAT-based bounded model ch...
Miroslaw Kurkowski, Wojciech Penczek
ICRA
2010
IEEE
193views Robotics» more  ICRA 2010»
15 years 3 months ago
Model-based motion tracking system using distributed network cameras
— For a coexisting and collaborative society that incorporates humans and robots, the detection, tracking, and recognition of human motion are indispensable techniques for a robo...
Yumi Iwashita, Ryo Kurazume, Takamitsu Mori, Masak...
TCOM
2011
94views more  TCOM 2011»
14 years 11 months ago
Protection Against Link Errors and Failures Using Network Coding
—We propose a network-coding based scheme to protect multiple bidirectional unicast connections against adversarial errors and failures in a network. The end nodes of the bidirec...
Shizheng Li, Aditya Ramamoorthy
MOBIHOC
2009
ACM
16 years 5 months ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
137
Voted
RECOMB
2007
Springer
16 years 4 months ago
An Efficient Method for Dynamic Analysis of Gene Regulatory Networks and in silico Gene Perturbation Experiments
With the increasing availability of experimental data on gene-gene and protein-protein interactions, modeling of gene regulatory networks has gained a special attention lately. To ...
Abhishek Garg, Ioannis Xenarios, Luis Mendoza, Gio...