Sciweavers

21520 search results - page 90 / 4304
» Symmetric network computation
Sort
View
TMI
2008
92views more  TMI 2008»
15 years 5 months ago
Using Perturbation Theory to Compute the Morphological Similarity of Diffusion Tensors
Computing the morphological similarity of diffusion tensors (DTs) at neighboring voxels within a DT image, or at corresponding locations across different DT images, is a fundamenta...
Ravi Bansal, Lawrence H. Staib, Dongrong Xu, Andre...
TWC
2008
138views more  TWC 2008»
15 years 5 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
COCOA
2007
Springer
15 years 11 months ago
Fundamental Domains for Integer Programs with Symmetries
We define a fundamental domain for a linear programming relaxation of a combinatorial integer program which is symmetric under a group action. We then describe a straightforward w...
Eric J. Friedman
COMPUTER
2010
76views more  COMPUTER 2010»
15 years 2 months ago
Sabotage!
We analyze the incentives of a vertically-integrated producer (VIP) to engage in "self-sabotage". Self-sabotage occurs when a VIP intentionally increases its upstream co...
David Alan Grier
PERCOM
2005
ACM
16 years 5 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis