Sciweavers

1479 search results - page 53 / 296
» Extremal collective behavior
Sort
View
WWW
2007
ACM
16 years 15 days ago
Extraction and classification of dense communities in the web
The World Wide Web (WWW) is rapidly becoming important for society as a medium for sharing data, information and services, and there is a growing interest in tools for understandi...
Yon Dourisboure, Filippo Geraci, Marco Pellegrini
VLSID
2008
IEEE
166views VLSI» more  VLSID 2008»
16 years 6 days ago
Exploring the Processor and ISA Design for Wireless Sensor Network Applications
Power consumption, physical size, and architecture design of sensor node processors have been the focus of sensor network research in the architecture community. What lies at the ...
Shashidhar Mysore, Banit Agrawal, Frederic T. Chon...
IPSN
2007
Springer
15 years 6 months ago
An empirical study of collaborative acoustic source localization
— Field biologists use animal sounds to discover the presence of individuals and to study their behavior. Collecting bio-acoustic data has traditionally been a difficult and tim...
Andreas M. Ali, Kung Yao, Travis C. Collier, Charl...
AIM
2002
14 years 11 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
ICIP
2006
IEEE
16 years 1 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao