Sciweavers

2311 search results - page 59 / 463
» Robustness and Generalization
Sort
View
CCS
2007
ACM
15 years 10 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
SENSYS
2004
ACM
15 years 9 months ago
Synopsis diffusion for robust aggregation in sensor networks
Previous approaches for computing duplicate-sensitive aggregates in sensor networks (e.g., in TAG) have used a tree topology, in order to conserve energy and to avoid double-count...
Suman Nath, Phillip B. Gibbons, Srinivasan Seshan,...
CGF
2008
108views more  CGF 2008»
15 years 4 months ago
Robust and Efficient Wave Simulations on Deforming Meshes
The goal of this paper is to enable the interactive simulation of phenomena such as animated fluid characters. While full 3D fluid solvers achieve this with control algorithms, th...
Roland Angst, Nils Thürey, Mario Botsch, Mark...
GRC
2010
IEEE
15 years 4 months ago
Interval Type-2 Fuzzy PI Controllers: Why They are More Robust
Abstract—Many experiments have shown that interval type2 (IT2) fuzzy PI controllers are generally more robust than their type-1 (T1) counterparts, as they are better able to cope...
Dongrui Wu, Woei Wan Tan
DSN
2007
IEEE
15 years 10 months ago
Robustness and Security Hardening of COTS Software Libraries
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and s...
Martin Süßkraut, Christof Fetzer