Sciweavers

13822 search results - page 2569 / 2765
» Models in Knowledge Management
Sort
View
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
15 years 10 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
MM
2006
ACM
142views Multimedia» more  MM 2006»
15 years 10 months ago
Large-scale video retrieval via semantic classification
ons for this project. Most recent ones are listed at the end of this abstract. In the future, feature selection will be integrated in the multi-class EM algorithm to improve the pe...
Hangzai Luo, Jianping Fan
MOBICOM
2006
ACM
15 years 10 months ago
Localized algorithm for aggregate fairness in wireless sensor networks
For data-collection applications in sensor networks, it is important to ensure all data sources have equal (or weighted) access to network bandwidth so that the base stations rece...
Shigang Chen, Zhan Zhang
INFOCOM
2005
IEEE
15 years 9 months ago
Joint optimal scheduling and routing for maximum network throughput
— In this paper we consider packet networks loaded by admissible traffic patterns, i.e. by traffic patterns that, if optimally routed, do not overload network resources. In the...
Emilio Leonardi, Marco Mellia, Marco Ajmone Marsan...
KBSE
2005
IEEE
15 years 9 months ago
Automated test generation for engineering applications
In test generation based on model-checking, white-box test criteria are represented as trap conditions written in a temporal logic. A model checker is used to refute trap conditio...
Songtao Xia, Ben Di Vito, César Muño...
« Prev « First page 2569 / 2765 Last » Next »