Sciweavers

4761 search results - page 799 / 953
» Generalizing Boundary Points
Sort
View
134
Voted
SIGCOMM
2012
ACM
13 years 3 months ago
Revealing contact interval patterns in large scale urban vehicular ad hoc networks
Contact interval between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs), which is important to routing schemes and network capacity. In this work,...
Yong Li, Depeng Jin, Pan Hui, Li Su, Lieguang Zeng
JMLR
2012
13 years 3 months ago
On Sparse, Spectral and Other Parameterizations of Binary Probabilistic Models
This paper studies issues relating to the parameterization of probability distributions over binary data sets. Several such parameterizations of models for binary data are known, ...
David Buchman, Mark W. Schmidt, Shakir Mohamed, Da...
INFOCOM
2012
IEEE
13 years 3 months ago
Cherish every joule: Maximizing throughput with an eye on network-wide energy consumption
—Conserving network-wide energy consumption is becoming an increasingly important concern for network operators. In this work, we study network-wide energy conservation problem w...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou
123
Voted
TOG
2012
301views Communications» more  TOG 2012»
13 years 3 months ago
An analytic model for full spectral sky-dome radiance
We present a physically-based analytical model of the daytime sky. Based on the results of a first-principles brute force simulation of radiative transfer in the atmosphere, we u...
Lukas Hosek, Alexander Wilkie
CRYPTO
2012
Springer
254views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
Breaking and Repairing GCM Security Proofs
Abstract. In this paper, we study the security proofs of GCM (Galois/Counter Mode of Operation). We first point out that a lemma, which is related to the upper bound on the probab...
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu