Results 1 - 10
of
3,380
Rumor Routing Algorithm for Sensor Networks
, 2002
"... Advances in micro-sensor and radio technology will enable small but smart sensors to be deployed for a wide range of environmental monitoring applications. In order to constrain communication overhead, dense sensor networks call for new and highly efficient methods for distributing queries to nodes ..."
Abstract
-
Cited by 417 (2 self)
- Add to MetaCart
that have observed interesting events in the network. A highly efficient data-centric routing mechanism will offer significant power cost reductions [17], and improve network longevity. Moreover, because of the large amount of system and data redundancy possible, data becomes disassociated from specific
Redundant Governance Structures: An Analysis of Structural and
- Relational Embeddedness in the Steel and Semiconductor Industries,” Strategic Management Journal
, 2000
"... Network researchers have argued that both relational embeddedness—characteristics of relationships—and structural embeddedness—characteristics of the relational structure— influence firm behavior and performance. Using strategic alliance networks in the semiconductor and steel industries, we build o ..."
Abstract
-
Cited by 244 (4 self)
- Add to MetaCart
on industry context. More specif-ically, our empirical analysis suggests that strong ties in a highly interconnected strategic alliance network negatively impact firm performance. This network configuration is especially suboptimal for firms in the semiconductor industry. Furthermore, strong and weak ties
Image coding based on a fractal theory of iterated contractive image transformations
- IEEE Trans. Image Process
, 1992
"... Abstract-The conception of digital image coding techniques is of great interest in various areas concerned with the storage or transmission of images. For the past few years, there has been a tendency to combine different classical coding tech-niques in order to obtain greater coding efficiency. In ..."
Abstract
-
Cited by 331 (0 self)
- Add to MetaCart
. In this paper, we propose an independent and novel ap-proach to image coding, based on a fractal theory of iterated transformations. The main characteristics of this approach are that i) it relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block
Negotiation-based Protocols for Disseminating Information in Wireless Sensor Networks
- Wireless Networks
, 2002
"... Abstract. In this paper, we present a family of adaptive protocols, called SPIN (Sensor Protocols for Information via Negotiation), that efficiently disseminate information among sensors in an energy-constrained wireless sensor network. Nodes running a SPIN communication protocol name their data usi ..."
Abstract
-
Cited by 275 (3 self)
- Add to MetaCart
using high-level data descriptors, called meta-data. They use meta-data negotiations to eliminate the transmission of redundant data throughout the network. In addition, SPIN nodes can base their communication decisions both upon application-specific knowledge of the data and upon knowledge
AR-SMT: A Microarchitectural Approach to Fault Tolerance in Microprocessors
, 1999
"... This paper speculates that technology trends pose new challenges for fault tolerance in microprocessors. Specifically, severely reduced design tolerances implied by gigaherz clock rates may result in frequent and arbitrary transient faults. We suggest that existing fault-tolerant techniques -- syste ..."
Abstract
-
Cited by 246 (8 self)
- Add to MetaCart
This paper speculates that technology trends pose new challenges for fault tolerance in microprocessors. Specifically, severely reduced design tolerances implied by gigaherz clock rates may result in frequent and arbitrary transient faults. We suggest that existing fault-tolerant techniques
The probability of duplicate gene preservation by subfunctionalization.
- Genetics
, 2000
"... ABSTRACT It has often been argued that gene-duplication events are most commonly followed by a mutational event that silences one member of the pair, while on rare occasions both members of the pair are preserved as one acquires a mutation with a beneficial function and the other retains the origin ..."
Abstract
-
Cited by 261 (2 self)
- Add to MetaCart
the probability of preservation. The model proposed herein leads to quantitative predictions that are consistent with observations on the frequency of long-term duplicate gene preservation and with observations that indicate that a common fate of the members of duplicate-gene pairs is the partitioning of tissue-specific
Cryptanalysis of block ciphers with overdefined systems of equations
, 2002
"... Abstract. Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on proba ..."
Abstract
-
Cited by 253 (22 self)
- Add to MetaCart
the sparsity of the equations and their specific structure. The XSL attack uses only relations true with probability 1, and thus the security does not have to grow exponentially in the number of rounds. XSL has a parameter P, and from our estimations is seems that P should be a constant or grow very slowly
RB: Programmer Specification of Redundancy
, 1987
"... ABSTRACT RB is a programming language for specifying redundancy in various dimensions. Avizienis's notation T I HIS, for Time I Hardware I Software, describes the different types of redundancy possible in a computation: repetition (nT I HIS), redundant hardware (T I nH I S), and program (softw ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
ABSTRACT RB is a programming language for specifying redundancy in various dimensions. Avizienis's notation T I HIS, for Time I Hardware I Software, describes the different types of redundancy possible in a computation: repetition (nT I HIS), redundant hardware (T I nH I S), and program
SPECIFICITY AND REDUNDANT CAUSATION
"... ABSTRACT. In this paper I present a metaphysically minimalist but theoreti-cally strong version of fact causation, in which the causal relata constitute a full Boolean algebra, mirroring the entailment relation of the sentences that express them. I suggest a generalization of the notion of multiple ..."
Abstract
- Add to MetaCart
realizability of causes in terms of specificity of facts, and employ this in an interpretation of what goes on in cases of apparently redundant causation. 1. CAUSES, PARTICULARS, AND FACTS I think that what exactly the causal relation relates is a very hard question. A common intuition is that, since causation
On the stopping distance and the stopping redundancy of codes
- IEEE Trans. Inf. Theory
, 2006
"... Abstract — It is now well known that the performance of a linear code C under iterative decoding on a binary erasure channel (and other channels) is determined by the size of the smallest stopping set in the Tanner graph for C. Several recent papers refer to this parameter as the stopping distance s ..."
Abstract
-
Cited by 56 (2 self)
- Add to MetaCart
, namely s(H) =d. We then derive general bounds on the stopping redundancy of linear codes. We also examine several simple ways of constructing codes from other codes, and study the effect of these constructions on the stopping redundancy. Specifically, for the family of binary Reed-Muller codes (of all
Results 1 - 10
of
3,380