Sciweavers

19985 search results - page 3856 / 3997
» Modelling Ecological Data
Sort
View
JSAC
2010
107views more  JSAC 2010»
15 years 1 months ago
Online learning in autonomic multi-hop wireless networks for transmitting mission-critical applications
Abstract—In this paper, we study how to optimize the transmission decisions of nodes aimed at supporting mission-critical applications, such as surveillance, security monitoring,...
Hsien-Po Shiang, Mihaela van der Schaar
137
Voted
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
15 years 1 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson
PVLDB
2010
134views more  PVLDB 2010»
15 years 1 months ago
High-Performance Dynamic Pattern Matching over Disordered Streams
Current pattern-detection proposals for streaming data recognize the need to move beyond a simple regular-expression model over strictly ordered input. We continue in this directi...
Badrish Chandramouli, Jonathan Goldstein, David Ma...
146
Voted
TMC
2010
130views more  TMC 2010»
15 years 1 months ago
Efficient Coverage Maintenance Based on Probabilistic Distributed Detection
—Many wireless sensor networks require sufficient sensing coverage over long periods of time. To conserve energy, a coverage maintenance protocol achieves desired coverage by act...
Guoliang Xing, Xiangmao Chang, Chenyang Lu, Jianpi...
125
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
« Prev « First page 3856 / 3997 Last » Next »