Sciweavers

11328 search results - page 2087 / 2266
» Timed Branching Processes
Sort
View
140
Voted
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 9 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
182
Voted
MOBISYS
2011
ACM
14 years 6 months ago
Exploiting FM radio data system for adaptive clock calibration in sensor networks
Clock synchronization is critical for Wireless Sensor Networks (WSNs) due to the need of inter-node coordination and collaborative information processing. Although many message pa...
Liqun Li, Guoliang Xing, Limin Sun, Wei Huangfu, R...
183
Voted
EUROSYS
2010
ACM
15 years 9 months ago
PUSH: A Dataflow Shell
The deluge of huge data sets such as those provided by sensor networks, online transactions, and the web provide exciting opportunities for data analysis. The scale of the data ...
Noah Evans, Eric Van Hensbergen
165
Voted
PLDI
1991
ACM
15 years 7 months ago
Advice to Authors of Extended Abstracts
o Authors of Extended Abstracts William Pugh Dept. of Computer Science and Institute for Advanced Computer Studies Univ. of Maryland, College Park March 16, 1993 This article stems...
William Pugh
143
Voted
TRECVID
2007
15 years 4 months ago
Determination of Shot Boundary in MPEG Videos for TRECVID 2007
TURED ABSTRACT Detection of shot boundary plays important roles in many video applications. Herein, a novel method on shot boundary detection from compressed video is proposed. Fir...
Jinchang Ren, Jianmin Jiang, Juan Chen
« Prev « First page 2087 / 2266 Last » Next »