Sciweavers

530 search results - page 106 / 106
» Practical Threshold Signatures
Sort
View
ICDM
2010
IEEE
199views Data Mining» more  ICDM 2010»
13 years 2 months ago
Addressing Concept-Evolution in Concept-Drifting Data Streams
Abstract--The problem of data stream classification is challenging because of many practical aspects associated with efficient processing and temporal behavior of the stream. Two s...
Mohammad M. Masud, Qing Chen, Latifur Khan, Charu ...
WD
2010
13 years 2 months ago
Coexistence of radio networks using Aloha
: In this paper we use an analytical model to study how two radio networks : a primary network and a secondary network can coexist within the same area. We use a very simple protoc...
Bartlomiej Blaszczyszyn, Paul Mühlethaler, Sk...
TWC
2010
12 years 11 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
CGF
2011
12 years 8 months ago
Walking On Broken Mesh: Defect-Tolerant Geodesic Distances and Parameterizations
Efficient methods to compute intrinsic distances and geodesic paths have been presented for various types of surface representations, most importantly polygon meshes. These meshe...
Marcel Campen, Leif Kobbelt
ATAL
2011
Springer
12 years 4 months ago
Maximizing revenue in symmetric resource allocation systems when user utilities exhibit diminishing returns
Consumers of resources in realistic applications (e.g., web, multimedia) typically derive diminishing-return utilities from the amount of resource they receive. A resource provide...
Roie Zivan, Miroslav Dudík, Praveen Paruchu...