Sciweavers

5169 search results - page 782 / 1034
» Locality approximation using time
Sort
View
INFOCOM
2010
IEEE
15 years 3 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
156
Voted
TELSYS
2010
94views more  TELSYS 2010»
15 years 3 months ago
An improved Hurst parameter estimator based on fractional Fourier transform
A fractional Fourier transform (FrFT) based estimation method is introduced in this paper to analyze the long range dependence (LRD) in time series. The degree of LRD can be chara...
Yangquan Chen, Rongtao Sun, Anhong Zhou
ICNP
2009
IEEE
15 years 2 months ago
RASPberry: A Stable Reader Activation Scheduling Protocol in Multi-Reader RFID Systems
Abstract--Recent technological advances have motivated largescale deployment of RFID systems. RFID readers are often static and carefully deployed in a planned manner. However, the...
ShaoJie Tang, Jing Yuan, Xiang-Yang Li, Guihai Che...
CDC
2010
IEEE
226views Control Systems» more  CDC 2010»
14 years 11 months ago
Fast primal-dual projected linear iterations for distributed consensus in constrained convex optimization
In this paper we study the constrained consensus problem, i.e. the problem of reaching a common point from the estimates generated by multiple agents that are constrained to lie in...
Ion Necoara, Ioan Dumitrache, Johan A. K. Suykens
EVOW
2012
Springer
14 years 13 days ago
A Variable Neighborhood Search Approach for the Two-Echelon Location-Routing Problem
Abstract. We consider the two-echelon location-routing problem (2ELRP), a well-known problem in freight distribution arising when establishing a two-level transport system with lim...
Martin Schwengerer, Sandro Pirkwieser, Günthe...