Sciweavers

539 search results - page 78 / 108
» The N R One Time Password System
Sort
View
CDC
2009
IEEE
208views Control Systems» more  CDC 2009»
14 years 10 months ago
Sensor selection for hypothesis testing in wireless sensor networks: a Kullback-Leibler based approach
We consider the problem of selecting a subset of p out of n sensors for the purpose of event detection, in a wireless sensor network (WSN). Occurrence or not of the event of intere...
Dragana Bajovic, Bruno Sinopoli, João Xavie...
LOGCOM
2010
152views more  LOGCOM 2010»
14 years 4 months ago
Constructive Logic with Strong Negation as a Substructural Logic
Gentzen systems are introduced for Spinks and Veroff's substructural logic corresponding to constructive logic with strong negation, and some logics in its vicinity. It has b...
Manuela Busaniche, Roberto Cignoli
79
Voted
SIROCCO
2008
14 years 11 months ago
Average Binary Long-Lived Consensus: Quantifying the Stabilizing Role Played by Memory
Abstract. Consider a system composed of n sensors operating in synchronous rounds. In each round an input vector of sensor readings x is produced, where the i-th entry of x is a bi...
Florent Becker, Sergio Rajsbaum, Ivan Rapaport, Er...
CODAS
2001
100views more  CODAS 2001»
14 years 11 months ago
Set-Based Access Conflicts Analysis of Concurrent Workflow Definition
An error-comprising workflow dejinition might provoke serious problems to an enterprise especially when it is involved with mission critical business processes. Concurrency of wor...
Minkyu Lee, Dongsoo Han, Jaeyong Shim
RTCSA
2005
IEEE
15 years 3 months ago
Approximation Algorithms for Scheduling Multiple Feasible Interval Jobs
Abstract— Time-critical jobs in many real-time applications have multiple feasible intervals. Such a job is constrained to execute from start to completion in one of its feasible...
Jian-Jia Chen, Jun Wu, Chi-Sheng Shih, Tei-Wei Kuo