Sciweavers

2555 search results - page 154 / 511
» Quantifiers and Working Memory
Sort
View
116
Voted
LCN
2005
IEEE
15 years 9 months ago
Fault Tolerant Active Rings for Structured Peer-to-Peer Overlays
Algorithms by which peers join and leave structured overlay networks can be classified as passive or active. Passive topology maintenance relies on periodic background repair of n...
John Risson, Ken Robinson, Tim Moors
199
Voted
LCN
2005
IEEE
15 years 9 months ago
The Time-Controlled Clustering Algorithm for Optimized Data Dissemination in Wireless Sensor Networks
—Wireless sensor networks afford a new opportunity to observe and interact with physical phenomena at an unprecedented fidelity. To fully realize this vision, these networks have...
S. Selvakennedy, Sukunesan Sinnappan
119
Voted
IH
2005
Springer
15 years 9 months ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...
170
Voted
CSFW
2003
IEEE
15 years 9 months ago
Anonymity and Information Hiding in Multiagent Systems
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal l...
Joseph Y. Halpern, Kevin R. O'Neill
138
Voted
ISQED
2003
IEEE
119views Hardware» more  ISQED 2003»
15 years 9 months ago
System and Framework for QA of Process Design Kits
In this paper, we evaluate the dependencies between tools, data and environment in process design kits, and present a framework for systematically analyzing the quality of the des...
M. C. Scott, M. O. Peralta, Jo Dale Carothers