Sciweavers

7228 search results - page 1012 / 1446
» From Algorithmic to Subjective Randomness
Sort
View
IJDSN
2006
114views more  IJDSN 2006»
15 years 4 months ago
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure ...
Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrish...
JMLR
2008
150views more  JMLR 2008»
15 years 4 months ago
Discriminative Learning of Max-Sum Classifiers
The max-sum classifier predicts n-tuple of labels from n-tuple of observable variables by maximizing a sum of quality functions defined over neighbouring pairs of labels and obser...
Vojtech Franc, Bogdan Savchynskyy
156
Voted
MTA
2006
115views more  MTA 2006»
15 years 4 months ago
Tree-assisted gossiping for overlay video distribution
Given its readily deployable nature and broad applications for digital entertainment, video streaming through overlay networks has received much attention recently. While a tree to...
Jiangchuan Liu, Ming Zhou
TSP
2008
115views more  TSP 2008»
15 years 4 months ago
Approximation Bounds for Semidefinite Relaxation of Max-Min-Fair Multicast Transmit Beamforming Problem
Consider a downlink multicast scenario where a base station equipped with multiple antennas wishes to simultaneously broadcast a number of signals to some given groups of users ove...
Tsung-Hui Chang, Zhi-Quan Luo, Chong-Yung Chi
VLSISP
2008
173views more  VLSISP 2008»
15 years 4 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee
« Prev « First page 1012 / 1446 Last » Next »