Sciweavers

2199 search results - page 429 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
AAAI
2006
15 years 1 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
NECO
2010
154views more  NECO 2010»
14 years 10 months ago
Role of Homeostasis in Learning Sparse Representations
Neurons in the input layer of primary visual cortex in primates develop edge-like receptive fields. One approach to understanding the emergence of this response is to state that ...
Laurent U. Perrinet
131
Voted
JAMIA
2010
115views more  JAMIA 2010»
14 years 7 months ago
The population health record: concepts, definition, design, and implementation
In 1997, the American Medical Informatics Association proposed a US information strategy that included a population health record (PopHR). Despite subsequent progress on the conce...
Daniel J. Friedman, R. Gibson Parrish II
146
Voted
MOBICOM
2009
ACM
15 years 7 months ago
Revenue maximization and distributed power allocation in cognitive radio networks
Cognitive radio is an enabling technology that allows unlicensed users to opportunistically access the spectrum in order to enhance the spectrum efficiency. In this paper, we cons...
Shaolei Ren, Mihaela van der Schaar
LCN
2007
IEEE
15 years 6 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood