Sciweavers

1287 search results - page 214 / 258
» Effective Performance Measurement at Petascale Using IPM
Sort
View
IJSN
2006
93views more  IJSN 2006»
14 years 9 months ago
Limiting DoS attacks during multihop data delivery in wireless sensor networks
: Denial of Service (DoS) attacks can be easily launched in Wireless Sensor Networks (WSNs). Due to their resource constraints, namely limited energy, memory and bandwidth, WSNs ar...
Jing Deng, Richard Han, Shivakant Mishra
JCP
2008
126views more  JCP 2008»
14 years 9 months ago
Hardware/Software Co-design Approach for an ADALINE Based Adaptive Control System
Abstract--In this paper, we report some results on hardware and software co-design of an adaptive linear neuron (ADALINE) based control system. A discrete-time Proportional-Integra...
Shouling He, Xuping Xu
KBS
2008
98views more  KBS 2008»
14 years 8 months ago
Mixed feature selection based on granulation and approximation
Feature subset selection presents a common challenge for the applications where data with tens or hundreds of features are available. Existing feature selection algorithms are mai...
Qinghua Hu, Jinfu Liu, Daren Yu
ISCI
2011
14 years 4 months ago
Rational Research model for ranking semantic entities
—Ranking plays important roles in contemporary Internet and vertical search engines. Among existing ranking algorithms, link analysis based algorithms have been proved as effecti...
Wang Wei, Payam M. Barnaghi, Andrzej Bargiela
CCS
2009
ACM
15 years 10 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...