Sciweavers

5448 search results - page 1018 / 1090
» Breakpoints and Time in Distributed Computations
Sort
View
WINET
2002
144views more  WINET 2002»
15 years 5 days ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
123
Voted
CIKM
2010
Springer
14 years 11 months ago
Preserving location and absence privacy in geo-social networks
Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal c...
Dario Freni, Carmen Ruiz Vicente, Sergio Mascetti,...
114
Voted
SADM
2010
128views more  SADM 2010»
14 years 11 months ago
Online training on a budget of support vector machines using twin prototypes
: This paper proposes twin prototype support vector machine (TVM), a constant space and sublinear time support vector machine (SVM) algorithm for online learning. TVM achieves its ...
Zhuang Wang, Slobodan Vucetic
TMC
2010
179views more  TMC 2010»
14 years 11 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
127
Voted
TMC
2010
142views more  TMC 2010»
14 years 11 months ago
DGRAM: A Delay Guaranteed Routing and MAC Protocol for Wireless Sensor Networks
This paper presents an integrated MAC and routing protocol called Delay Guaranteed Routing and MAC (DGRAM) for delay sensitive wireless sensor network (WSN) applications. DGRAM is...
Shanti Chilukuri, Anirudha Sahoo
« Prev « First page 1018 / 1090 Last » Next »