Sciweavers

619 search results - page 13 / 124
» Coalition detection and identification
Sort
View
67
Voted
ADT
2010
14 years 8 months ago
Survey of NLOS identification and error mitigation problems in UWB-based positioning algorithms for dense environments
Abstract In this survey, the currently available ultrawideband-based non-line-of-sight (NLOS) identification and error mitigation methods are presented. They are classified into se...
Jasurbek Khodjaev, Yongwan Park, Aamir Saeed Malik
88
Voted
NAACL
2010
14 years 8 months ago
Language Identification: The Long and the Short of the Matter
Language identification is the task of identifying the language a given document is written in. This paper describes a detailed examination of what models perform best under diffe...
Timothy Baldwin, Marco Lui
ISCAS
2003
IEEE
123views Hardware» more  ISCAS 2003»
15 years 3 months ago
Classification of power system faults using wavelet transforms and probabilistic neural networks
Automation of power system fault identification using information conveyed by the wavelet analysis of power system transients is proposed. Probabilistic Neural Network (PNN) for d...
Harish K. Kashyap, U. Jayachandra Shenoy
70
Voted
ICICS
2004
Springer
15 years 3 months ago
Robust Metering Schemes for General Access Structures
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. They sho...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
101
Voted
SOCINFO
2010
14 years 8 months ago
Social Manipulation of Online Recommender Systems
Abstract. Online recommender systems are a common target of attack. Existing research has focused on automated manipulation of recommender systems through the creation of shill acc...
Juan Lang, Matt Spear, Shyhtsun Felix Wu