Sciweavers

8080 search results - page 1521 / 1616
» From Computer Networks to Agent Networks
Sort
View
153
Voted
ISCI
2010
146views more  ISCI 2010»
15 years 27 days ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
133
Voted
CDC
2010
IEEE
144views Control Systems» more  CDC 2010»
14 years 10 months ago
Formal analysis of piecewise affine systems through formula-guided refinement
Abstract-- We present a computational framework for identifying a set of initial states from which all trajectories of a piecewise affine (PWA) system satisfy a Linear Temporal Log...
Boyan Yordanov, Jana Tumova, Calin Belta, Ivana Ce...
BICA
2010
14 years 10 months ago
Validating a High Level Behavioral Representation Language (HERBAL): A Docking Study for ACT-R
We present a docking study for Herbal, a high-level behavioral representation language based on the problem space computational model. This study docks an ACT-R model created with ...
Changkun Zhao, Jaehyon Paik, Jonathan H. Morgan, F...
127
Voted
PE
2010
Springer
124views Optimization» more  PE 2010»
14 years 10 months ago
High-level approach to modeling of observed system behavior
Current computer systems and communication networks tend to be highly complex, and they typically hide their internal structure from their users. Thus, for selected aspects of cap...
Thomas Begin, Alexandre Brandwajn, Bruno Baynat, B...
123
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Complex random matrices and multiple-antenna spectrum sensing
In this paper, we study the eigenvalue-based spectrum sensing techniques for multiple-antenna cognitive radio networks. First, we study the extreme eigenvalue distributions of a c...
Tharmalingam Ratnarajah, Caijun Zhong, Ayse Kortun...
« Prev « First page 1521 / 1616 Last » Next »