Sciweavers

2237 search results - page 363 / 448
» On the Security of Random Sources
Sort
View
ACCV
2010
Springer
15 years 4 days ago
MRF Labeling for Multi-view Range Image Integration
Multi-view range image integration focuses on producing a single reasonable 3D point cloud from multiple 2.5D range images for the reconstruction of a watertight manifold surface. ...
Ran Song, Yonghuai Liu, Ralph R. Martin, Paul L. R...
TC
2011
15 years 1 days ago
An Architecture for Fault-Tolerant Computation with Stochastic Logic
—Mounting concerns over variability, defects and noise motivate a new approach for digital circuitry: stochastic logic, that is to say, logic that operates on probabilistic signa...
Weikang Qian, Xin Li, Marc D. Riedel, Kia Bazargan...
TMC
2011
201views more  TMC 2011»
15 years 1 days ago
Data Delivery Properties of Human Contact Networks
—Pocket Switched Networks take advantage of social contacts to opportunistically create data paths over time. This work employs empirical traces to examine the effect of the huma...
Nishanth Sastry, D. Manjunath, Karen R. Sollins, J...
ITIIS
2010
247views more  ITIIS 2010»
14 years 12 months ago
An Efficient Overlay for Unstructured P2P File Sharing over MANET using Underlying Cluster-based Routing
In traditional unstructured P2P file sharing network, each peer establishes connections with a certain number of randomly chosen other peers. This would lead to redundant traffic ...
Nadir Shah, Depei Qian
TIT
2010
114views Education» more  TIT 2010»
14 years 11 months ago
The balanced unicast and multicast capacity regions of large wireless networks
We consider the question of determining the scaling of the n2 -dimensional balanced unicast and the n2n dimensional balanced multicast capacity regions of a wireless network with ...
Urs Niesen, Piyush Gupta, Devavrat Shah