Results 61 to 70 of about 171,423 (192)

Key Pre-Distributions From Graph-Based Block Designs

open access: yes, 2015
With the development of wireless communication technologies which considerably contributed to the development of wireless sensor networks (WSN), we have witnessed an ever-increasing WSN based applications which induced a host of research activities in ...
Bouabdallah, Abdelmadjid   +2 more
core   +3 more sources

An Inequality for Balanced Incomplete Block Designs

open access: yesThe Annals of Mathematical Statistics, 1960
The inequality $b \geqq v + r - 1$ for a balanced incomplete block design was proved by Bose [1] under the assumption of resolvability. In this note the inequality is proved without that assumption, but with the weaker assumption that $v = nk$.
openaire   +2 more sources

Repairable Block Failure Resilient Codes

open access: yes, 2014
In large scale distributed storage systems (DSS) deployed in cloud computing, correlated failures resulting in simultaneous failure (or, unavailability) of blocks of nodes are common.
Calis, Gokhan, Koyluoglu, O. Ozan
core   +1 more source

Hierarchical Trust Level Evaluation for Pervasive Social Networking

open access: yesIEEE Access, 2017
Pervasive social networking (PSN) is a fundamental infrastructure in social networking that has played an important role in not only the Internet but also mobile domains.
Jian Shen   +4 more
doaj   +1 more source

Collusion Attack Resilient 3D Mesh Watermarking Based on Anti-Collusion Fingerprint Code

open access: yesApplied Sciences, 2018
Collusion attack is one of the techniques used for unauthorized removal of embedded marks. However, there are no algorithms that utilize the averaging-resilient fingerprint code into 3D mesh watermarking.
Jong-Uk Hou, In-Jae Yu, Heung-Kyu Lee
doaj   +1 more source

High-Speed Visible Light Indoor Networks Based on Optical Orthogonal Codes and Combinatorial Designs

open access: yes, 2013
Interconnecting devices in an indoor environment using the illumination system and white light emitting diodes (LED) requires adaptive networking techniques that can provide network access for multiple users.
Brandt-Pearce, Maite, Noshad, Mohammad
core   +1 more source

Optimal two-level conjoint designs for large numbers of attributes. [PDF]

open access: yes
In this paper, we propose a simple strategy to construct D-, A-, G- and V-optimal two-level multi-attribute designs for rating-based conjoint studies. Our approach combines orthogonal designs and balanced or partially balanced incomplete block designs ...
Goos, P   +2 more
core  

Incidence Bounds for Block Designs

open access: yes, 2016
We prove three theorems giving extremal bounds on the incidence structures determined by subsets of the points and blocks of a balanced incomplete block design (BIBD).
Lund, Ben, Saraf, Shubhangi
core   +1 more source

A Note on Balanced Incomplete Block Designs

open access: yesThe Annals of Mathematical Statistics, 1969
Summary: The author studies balanced incomplete block designs (BIBD) in which the blocks are not necessarily distinct. He proves the following Theorem. Let \(\mathcal D\) be a BIBD with parameters \(v,b,r,k,\lambda\). If \(s\) blocks of \(\mathcal D\) are identical and if \(r>\lambda\), then \(r/k=b/v\ge s\). The theorem implies the results of E.
openaire   +2 more sources

ESTIMASI MODEL UNTUK DATA DEPENDEN DENGAN METODE CROSS VALIDATION

open access: yesMedia Statistika, 2008
This paper discuss about application of cross-validation method for modeling of dependent data. One of the data that categorized into dependent data is a time series.
Tarno Tarno
doaj   +1 more source

Home - About - Disclaimer - Privacy