Sciweavers

734 search results - page 51 / 147
» Computer Virus Propagation Models
Sort
View
WIOPT
2005
IEEE
15 years 3 months ago
Interference Power Sum with Log-Normal Components in Ad-Hoc and Sensor Networks
The log-normal shadowing radio model has frequently been used to model radio propagation conditions. There exist accurate calculation methods for estimation of interference power ...
Ramin Hekmat, Piet Van Mieghem
PADS
2004
ACM
15 years 3 months ago
Optimizing Parallel Execution of Detailed Wireless Network Simulation
With Parallel and Discrete Event Simulation (PDES) techniques, the runtime performance of detailed wireless network simulation can be improved significantly without compromising ...
Zhengrong Ji, Junlan Zhou, Mineo Takai, Jay Martin...
CVPR
2007
IEEE
15 years 11 months ago
Tracking as Repeated Figure/Ground Segmentation
Tracking over a long period of time is challenging as the appearance, shape and scale of the object in question may vary. We propose a paradigm of tracking by repeatedly segmentin...
Xiaofeng Ren, Jitendra Malik
PRL
2008
118views more  PRL 2008»
14 years 9 months ago
Bayes Machines for binary classification
In this work we propose an approach to binary classification based on an extension of Bayes Point Machines. Particularly, we take into account the whole set of hypotheses that are...
Daniel Hernández-Lobato, José Miguel...
SIROCCO
2008
14 years 11 months ago
Word of Mouth: Rumor Dissemination in Social Networks
In this paper we examine the diffusion of competing rumors in social networks. Two players select a disjoint subset of nodes as initiators of the rumor propagation, seeking to maxi...
Jan Kostka, Yvonne Anne Oswald, Roger Wattenhofer