Sciweavers

2089 search results - page 297 / 418
» Finding Environment Guarantees
Sort
View
ITIIS
2010
140views more  ITIIS 2010»
14 years 11 months ago
RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks
Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local informa...
In Hur, Moonseong Kim, Jaewan Seo, Hyunseung Choo
JDCTA
2010
172views more  JDCTA 2010»
14 years 11 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
TFS
2010
152views Education» more  TFS 2010»
14 years 11 months ago
Robust Optimal Reference-Tracking Design Method for Stochastic Synthetic Biology Systems: T-S Fuzzy Approach
At present, the development in the nascent field of synthetic gene networks is still difficult. Most newly created gene networks are nonfunctioning due to intrinsic parameter fluct...
Bor-Sen Chen, Chih-Hung Wu
ICCV
2011
IEEE
14 years 4 months ago
Strong Supervision From Weak Annotation: Interactive Training of Deformable Part Models
We propose a framework for large scale learning and annotation of structured models. The system interleaves interactive labeling (where the current model is used to semiautomate t...
Steven Branson, Pietro Perona, Serge Belongie
SOFSEM
2012
Springer
13 years 12 months ago
Recent Challenges and Ideas in Temporal Synthesis
In automated synthesis, we transform a specification into a system that is guaranteed to satisfy the specification against all environments. While modelchecking theory has led to...
Orna Kupferman