Sciweavers

487 search results - page 65 / 98
» Detecting Link Spam Using Temporal Information
Sort
View
MOBIHOC
2005
ACM
15 years 11 months ago
Sextant: a unified node and event localization framework using non-convex constraints
Determining node and event locations is a canonical task for many wireless network applications. Yet dedicated infrastructure for determining position information is expensive, en...
Emin Gün Sirer, Rohan Murty, Saikat Guha
JASIS
2010
262views more  JASIS 2010»
14 years 10 months ago
New event detection and topic tracking in Turkish
Topic detection and tracking (TDT) applications aim to organize the temporally ordered stories of a news stream according to the events. Two major problems in TDT are new event de...
Fazli Can, Seyit Kocberber, Ozgur Baglioglu, Suley...
COMCOM
2008
120views more  COMCOM 2008»
14 years 12 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 6 months ago
Minimizing Energy Consumption in IR-UWB Based Wireless Sensor Networks
Abstract—Impulse Radio Ultra-wideband (IR-UWB) communication has proven an important technique for supporting highrate, short-range, low-power communication. These are necessary ...
Tianqi Wang, Wendi B. Heinzelman, Alireza Seyedi
RAS
2007
132views more  RAS 2007»
14 years 11 months ago
Virtual sensors for human concepts - Building detection by an outdoor mobile robot
Abstract— In human-robot communication it is often important to relate robot sensor readings to concepts used by humans. We suggest to use a virtual sensor (one or several physic...
Martin Persson, Tom Duckett, Achim J. Lilienthal