Sciweavers

3422 search results - page 572 / 685
» Random Subset Optimization
Sort
View
130
Voted
HICSS
2005
IEEE
154views Biometrics» more  HICSS 2005»
15 years 8 months ago
Market Structure and the Predictability of Electricity System Line Flows: An Experimental Analysis
Robert Thomas has shown, using simulations of experimental results, that the power flow on any line in an electric network is linearly proportional to the total system load when t...
Nodir Adilov, Thomas Light, Richard E. Schuler, Wi...
124
Voted
INFOCOM
2005
IEEE
15 years 8 months ago
Time and energy complexity of distributed computation in wireless sensor networks
— We consider a scenario where a wireless sensor network is formed by randomly deploying n sensors to measure some spatial function over a field, with the objective of computing...
Nilesh Khude, Anurag Kumar, Aditya Karnik
126
Voted
TCC
2005
Springer
116views Cryptology» more  TCC 2005»
15 years 8 months ago
Error Correction in the Bounded Storage Model
We initiate a study of Maurer’s bounded storage model (JoC, 1992) in presence of transmission errors and perhaps other types of errors that cause different parties to have incon...
Yan Zong Ding
120
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
Exploiting Multiuser Diversity for Medium Access Control in Wireless Networks
— Multiuser diversity refers to a type of diversity present across different users in a fading environment. This diversity can be exploited by scheduling transmissions so that us...
Xiangping Qin, Randall A. Berry
105
Voted
CCS
2003
ACM
15 years 8 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis