Sciweavers

1208 search results - page 182 / 242
» Uniform eventown problems
Sort
View
CORR
2010
Springer
94views Education» more  CORR 2010»
14 years 9 months ago
Is Witsenhausen's counterexample a relevant toy?
This paper answers a question raised by Doyle on the relevance of the Witsenhausen counterexample as a toy decentralized control problem. The question has two sides, the first of w...
Pulkit Grover, Anant Sahai
CORR
2006
Springer
71views Education» more  CORR 2006»
14 years 9 months ago
Wreath Products in Stream Cipher Design
The paper develops a novel approach to stream cipher design: Both the state update function and the output function of the corresponding pseudorandom generators are compositions of...
Vladimir Anashin
CSL
2006
Springer
14 years 9 months ago
Adaptation of maximum entropy capitalizer: Little data can help a lot
A novel technique for maximum "a posteriori" (MAP) adaptation of maximum entropy (MaxEnt) and maximum entropy Markov models (MEMM) is presented. The technique is applied...
Ciprian Chelba, Alex Acero
IJSNET
2008
115views more  IJSNET 2008»
14 years 9 months ago
Event-driven sensor deployment using self-organizing maps
: Coverage is an important optimization objective in pre and post-deployment stage of a Wireless Sensor Network (WSN). In this paper, we address the issue of placing a finite set o...
Cris Koutsougeras, Yi Liu, Rong Zheng
CN
2007
111views more  CN 2007»
14 years 9 months ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...