Sciweavers

4622 search results - page 807 / 925
» Foundations of Information Theory
Sort
View
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 1 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
PUC
2007
116views more  PUC 2007»
15 years 1 months ago
Periodic properties of user mobility and access-point popularity
Understanding user mobility and its effect on access points (APs) is important in designing location-aware systems and wireless networks. Although various studies of wireless netwo...
Minkyong Kim, David Kotz
PAMI
2008
161views more  PAMI 2008»
15 years 1 months ago
Multilayered 3D LiDAR Image Construction Using Spatial Models in a Bayesian Framework
Standard 3D imaging systems process only a single return at each pixel from an assumed single opaque surface. However, there are situations when the laser return consists of multip...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...
CORR
2010
Springer
107views Education» more  CORR 2010»
15 years 16 days ago
Distributed Detection over Time Varying Networks: Large Deviations Analysis
—We apply large deviations theory to study asymptotic performance of running consensus distributed detection in sensor networks. Running consensus is a stochastic approximation t...
Dragana Bajovic, Dusan Jakovetic, João Xavi...
FSS
2010
107views more  FSS 2010»
15 years 16 days ago
Cut approach to islands in rectangular fuzzy relations
The paper investigates fuzzy relations on a finite domain in the cutworthy framework, dealing with a new property coming from the information theory. If the domain of a relation i...
Eszter K. Horváth, Branimir Seselja, Andrej...