Sciweavers

1156 search results - page 82 / 232
» Bayesian Networks for Reliability Analysis of Complex System...
Sort
View
140
Voted
CCS
2009
ACM
15 years 10 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
GLOBECOM
2008
IEEE
15 years 3 months ago
Power Allocation for Cognitive Radios Based on Primary User Activity in an OFDM System
Efficient and reliable power allocation algorithm in Cognitive radio (CR) networks is a challenging problem. Traditional water-filling algorithm is inefficient for CR networks due ...
Ziaul Hasan, Ekram Hossain, Charles L. Despins, Vi...
IJCV
2006
107views more  IJCV 2006»
15 years 3 months ago
Behavioral Priors for Detection and Tracking of Pedestrians in Video Sequences
In this paper we address the problem of detection and tracking of pedestrians in complex scenarios. The inclusion of prior knowledge is more and more crucial in scene analysis to g...
Gianluca Antonini, Santiago Venegas-Martinez, Mich...
IMC
2007
ACM
15 years 4 months ago
Acyclic type-of-relationship problems on the internet: an experimental analysis
An experimental study of the feasibility and accuracy of the acyclicity approach introduced in [14] for the inference of business relationships among autonomous systems (ASes) is ...
Benjamin Hummel, Sven Kosub
HICSS
2002
IEEE
98views Biometrics» more  HICSS 2002»
15 years 8 months ago
Growth and Propagation of Disturbances in a Communication Network Model
In a society in which information is one of the highest-valued commodities, information networks are the economic backbone. Therefore, network vulnerability is a major hazard. Ana...
David E. Newman, Nathaniel D. Sizemore, Vickie E. ...