Sciweavers

2741 search results - page 282 / 549
» Engineering Mathematical Knowledge
Sort
View
CCS
2005
ACM
15 years 9 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
MSN
2005
Springer
179views Sensor Networks» more  MSN 2005»
15 years 9 months ago
Coverage Analysis for Wireless Sensor Networks
The coverage problem in wireless sensor networks (WSNs) is to determine the number of active sensor nodes needed to cover the sensing area. The purpose is to extend the lifetime of...
Ming Liu, Jiannong Cao, Wei Lou, Lijun Chen 0006, ...
ALGOSENSORS
2004
Springer
15 years 9 months ago
WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks
WiseMAC is a medium access control protocol designed for wireless sensor networks. This protocol is based on non-persistent CSMA and uses the preamble sampling technique to minimiz...
Amre El-Hoiydi, Jean-Dominique Decotignie
ISMIR
2004
Springer
90views Music» more  ISMIR 2004»
15 years 9 months ago
Automatic extraction of music descriptors from acoustic signals
High-Level music descriptors are key ingredients for music information retrieval systems. Although there is a long tradition in extracting information from acoustic signals, the f...
François Pachet, Aymeric Zils
ITS
2004
Springer
130views Multimedia» more  ITS 2004»
15 years 9 months ago
Opening the Door to Non-programmers: Authoring Intelligent Tutor Behavior by Demonstration
Abstract. Intelligent tutoring systems are quite difficult and time intensive to develop. In this paper, we describe a method and set of software tools that ease the process of cog...
Kenneth R. Koedinger, Vincent Aleven, Neil T. Heff...