Sciweavers

8080 search results - page 1390 / 1616
» From Computer Networks to Agent Networks
Sort
View
SIGCOMM
2009
ACM
15 years 11 months ago
VUPoints: collaborative sensing and video recording through mobile phones
Mobile phones are becoming a convergent platform for sensing, computation, and communication. This paper envisions VUPoints, a collaborative sensing and video-recording system tha...
Xuan Bao, Romit Roy Choudhury
NDSS
2007
IEEE
15 years 11 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
ISPAN
2005
IEEE
15 years 10 months ago
Supervised Peer-to-Peer Systems
In this paper we present a general methodology for designing supervised peer-to-peer systems. A supervised peer-to-peer system is a system in which the overlay network is formed b...
Kishore Kothapalli, Christian Scheideler
WCNC
2010
IEEE
15 years 8 months ago
A New LLMS Algorithm for Antenna Array Beamforming
A new adaptive algorithm, called LLMS, which employs an array image factor, IA , sandwiched in between two Least Mean Square (LMS) sections, is proposed for different applications ...
Jalal Abdulsayed Srar, Kah-Seng Chung, Ali Mansour
AINA
2004
IEEE
15 years 8 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
« Prev « First page 1390 / 1616 Last » Next »