Sciweavers

1316 search results - page 255 / 264
» Comparing mathematical models on the problem of network infe...
Sort
View
IJWMC
2010
103views more  IJWMC 2010»
14 years 9 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
112
Voted
INFOCOM
2011
IEEE
14 years 3 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
112
Voted
EDBT
2012
ACM
228views Database» more  EDBT 2012»
13 years 2 months ago
Finding maximal k-edge-connected subgraphs from a large graph
In this paper, we study how to find maximal k-edge-connected subgraphs from a large graph. k-edge-connected subgraphs can be used to capture closely related vertices, and findin...
Rui Zhou, Chengfei Liu, Jeffrey Xu Yu, Weifa Liang...
STOC
2005
ACM
129views Algorithms» more  STOC 2005»
15 years 12 months ago
Learning with attribute costs
We study an extension of the "standard" learning models to settings where observing the value of an attribute has an associated cost (which might be different for differ...
Haim Kaplan, Eyal Kushilevitz, Yishay Mansour
BMCBI
2006
216views more  BMCBI 2006»
14 years 11 months ago
Machine learning approaches to supporting the identification of photoreceptor-enriched genes based on expression data
Background: Retinal photoreceptors are highly specialised cells, which detect light and are central to mammalian vision. Many retinal diseases occur as a result of inherited dysfu...
Haiying Wang, Huiru Zheng, David Simpson, Francisc...