Engineering and Mathematics Network

Results: 205



#Item
51Having Your Cake and Eating It Too: Jointly Optimal Erasure Codes for I/O, Storage, and Network-bandwidth KV Rashmi, Preetum Nakkiran, Jingyan Wang, Nihar B. Shah, and Kannan Ramchandran, University of California, Berkel

Having Your Cake and Eating It Too: Jointly Optimal Erasure Codes for I/O, Storage, and Network-bandwidth KV Rashmi, Preetum Nakkiran, Jingyan Wang, Nihar B. Shah, and Kannan Ramchandran, University of California, Berkel

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-06-10 01:10:30
52Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Zichao Yang and John C.S. Lui Computer Science & Engineering Department The Chinese University of Hong Kong Abstract. Hosts (or nodes)

Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Zichao Yang and John C.S. Lui Computer Science & Engineering Department The Chinese University of Hong Kong Abstract. Hosts (or nodes)

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-06-30 22:31:18
53Deployment algorithms for dynamically constrained mobile robots Sonia Martinez, UC San Diego (UCSD), Mechanical and Aerospace Engineering Department Abstract Recent advances in communications, sensing and computation hav

Deployment algorithms for dynamically constrained mobile robots Sonia Martinez, UC San Diego (UCSD), Mechanical and Aerospace Engineering Department Abstract Recent advances in communications, sensing and computation hav

Add to Reading List

Source URL: people.ucsc.edu

Language: English - Date: 2012-02-08 04:16:02
54Investigating the Effect of Node Heterogeneity and Network Externality on Security Adoption Zichao Yang John C.S. Lui Computer Science & Engineering Department The Chinese University of Hong Kong

Investigating the Effect of Node Heterogeneity and Network Externality on Security Adoption Zichao Yang John C.S. Lui Computer Science & Engineering Department The Chinese University of Hong Kong

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-06-04 01:49:08
55Supplemental Material : A Unified Framework for Multi-Target Tracking and Collective Activity Recognition Wongun Choi and Silvio Savarese Electrical and Computer Engineering, University of Michigan, Ann Arbor, USA {wgcho

Supplemental Material : A Unified Framework for Multi-Target Tracking and Collective Activity Recognition Wongun Choi and Silvio Savarese Electrical and Computer Engineering, University of Michigan, Ann Arbor, USA {wgcho

Add to Reading List

Source URL: cvgl.stanford.edu

Language: English - Date: 2014-04-08 01:52:59
56STEMNET logo_26pt_strapline.eps

STEMNET logo_26pt_strapline.eps

Add to Reading List

Source URL: www.stemnet.org.uk

Language: English - Date: 2014-06-12 05:16:26
57Permutation Free Encoding Technique for Evolving Neural Networks Anupam Das, Md. Shohrab Hossain, Saeed Muhammad Abdullah, and Rashed Ul Islam Department of Computer Science and Engineering, Bangladesh University of Engi

Permutation Free Encoding Technique for Evolving Neural Networks Anupam Das, Md. Shohrab Hossain, Saeed Muhammad Abdullah, and Rashed Ul Islam Department of Computer Science and Engineering, Bangladesh University of Engi

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2012-12-05 18:42:52
58Distributed Compressive Sensing Reconstruction Via Common Support Discovery Wei Chen∗ , Miguel R. D. Rodrigues† and Ian J. Wassell∗ ∗  †

Distributed Compressive Sensing Reconstruction Via Common Support Discovery Wei Chen∗ , Miguel R. D. Rodrigues† and Ian J. Wassell∗ ∗ †

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-11-08 10:17:14
59Lecture 6: Finite Fields (PART 3) PART 3: Polynomial Arithmetic Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security” by Avi Kak () January 29, 2015

Lecture 6: Finite Fields (PART 3) PART 3: Polynomial Arithmetic Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security” by Avi Kak () January 29, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-01-29 15:31:09
60A Local Seed Selection Algorithm for Overlapping Community Detection Farnaz Moradi, Tomas Olovsson, Philippas Tsigas Department of Computer Science and Engineering Chalmers University of Technology, Gothenburg, Sweden Em

A Local Seed Selection Algorithm for Overlapping Community Detection Farnaz Moradi, Tomas Olovsson, Philippas Tsigas Department of Computer Science and Engineering Chalmers University of Technology, Gothenburg, Sweden Em

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-10 08:47:27