Sciweavers

4052 search results - page 685 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
154
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
135
Voted
SCIENTOMETRICS
2011
14 years 6 months ago
Towards a typology of research performance diversity: the case of top Hungarian players
Measuring the intellectual diversity encoded in publication records as a proxy to the degree of interdisciplinarity has recently received considerable attention in the science mapp...
Sándor Soós, George Kampis
339
Voted

Publication
363views
14 years 2 months ago
Detecting and Discriminating Behavioural Anomalies
This paper aims to address the problem of anomaly detection and discrimination in complex behaviours, where anomalies are subtle and difficult to detect owing to the complex tempor...
Chen Change Loy, Tao Xiang, Shaogang Gong
MOBISYS
2004
ACM
16 years 3 months ago
Divert: Fine-grained Path Selection for Wireless LANs
The performance of Wireless Local Area Networks (WLANs) often suffers from link-layer frame losses caused by noise, interference, multipath, attenuation, and user mobility. We obs...
Allen K. L. Miu, Godfrey Tan, Hari Balakrishnan, J...
ICRA
2005
IEEE
102views Robotics» more  ICRA 2005»
15 years 9 months ago
Hand Force Estimation using Electromyography Signals
— In many studies and applications that include direct human involvement such as human-robot interaction, control of prosthetic arms, and human factor studies, hand force is need...
Farid Mobasser, Keyvan Hashtrudi-Zaad