Sciweavers

882 search results - page 116 / 177
» Improving the Efficiency of Workflow Analysis
Sort
View
TC
2008
14 years 10 months ago
On the Computational Security of a Distributed Key Distribution Scheme
In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some server...
Vanesa Daza, Javier Herranz, Germán S&aacut...
AUTOMATICA
2005
137views more  AUTOMATICA 2005»
14 years 10 months ago
Multivariable frequency-response curve fitting with application to modal parameter estimation
This paper presents a computational approach for the frequency-domain identification of multivariable, discrete-time transfer function models based on a cost function minimization...
P. Verboven, P. Guillaume, B. Cauberghe
TON
2002
83views more  TON 2002»
14 years 9 months ago
MLSR: a novel routing algorithm for multilayered satellite IP networks
Several IP-based routing algorithms have been developed for low-Earth orbit (LEO) satellite networks in recent years. The performance of the satellite IP networks can be improved d...
Ian F. Akyildiz, Eylem Ekici, Michael D. Bender
ACL
2009
14 years 7 months ago
Chinese Term Extraction Using Different Types of Relevance
This paper presents a new term extraction approach using relevance between term candidates calculated by a link analysis based method. Different types of relevance are used separa...
Yuhang Yang, Tiejun Zhao, Qin Lu, Dequan Zheng, Ha...
MSWIM
2009
ACM
15 years 4 months ago
The MAC unreliability problem in IEEE 802.15.4 wireless sensor networks
In recent years, the number of sensor network deployments for real-life applications has rapidly increased and it is expected to expand even more in the near future. Actually, for...
Giuseppe Anastasi, Marco Conti, Mario Di Francesco