Sciweavers

1122 search results - page 139 / 225
» Behavioral Extensions of Institutions
Sort
View
EDBT
2010
ACM
202views Database» more  EDBT 2010»
15 years 4 months ago
Querying trajectories using flexible patterns
The wide adaptation of GPS and cellular technologies has created many applications that collect and maintain large repositories of data in the form of trajectories. Previous work ...
Marcos R. Vieira, Petko Bakalov, Vassilis J. Tsotr...
AINA
2008
IEEE
15 years 4 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar
AINA
2008
IEEE
15 years 4 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
DSRT
2008
IEEE
15 years 4 months ago
Design of Application-Specific Incentives in P2P Networks
A rational P2P node may decide not to provide a particular resource or to provide it with degraded quality. If nodes are very likely to behave this way, or if the failure of an P2...
Andrew Roczniak, Abdulmotaleb El-Saddik, Ross Kouh...
ICASSP
2008
IEEE
15 years 4 months ago
Brute-forcing hierarchical functionals for paralinguistics: A waste of feature space?
While the ”‘quasi-state-of-the-art”’ towards acoustic emotion recognition relies on multivariate time-series analysis of e.g. pitch, energy, or MFCC by statistical functio...
Björn Schuller, Matthias Wimmer, Lorenz Moese...