Sciweavers

1626 search results - page 250 / 326
» Subtyping with Power Types
Sort
View
JNW
2008
122views more  JNW 2008»
15 years 4 months ago
A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems
The capabilities of a sensor network are strongly influenced by the operating system used on the sensor nodes. In general, two different sensor network operating system types are c...
Cormac Duffy, Utz Roedig, John Herbert, Cormac J. ...
JSAC
2008
95views more  JSAC 2008»
15 years 4 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
ECCC
2007
144views more  ECCC 2007»
15 years 4 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
JMLR
2006
106views more  JMLR 2006»
15 years 4 months ago
Stability Properties of Empirical Risk Minimization over Donsker Classes
We study some stability properties of algorithms which minimize (or almost-minimize) empirical error over Donsker classes of functions. We show that, as the number n of samples gr...
Andrea Caponnetto, Alexander Rakhlin
JSAC
2006
85views more  JSAC 2006»
15 years 4 months ago
Transmit selection diversity with maximal-ratio combining for multicarrier DS-CDMA wireless networks over Nakagami-m fading chan
Abstract--We propose the scheme to integrate transmit selection diversity/maximal-ratio combining (TSD/MRC) with multicarrier (MC) direct-sequence code-division multiple access (DS...
Jia Tang, Xi Zhang