Sciweavers

978 search results - page 116 / 196
» Knowledge, Probability, and Adversaries
Sort
View
WWW
2007
ACM
15 years 10 months ago
Exploration of query context for information retrieval
A number of existing information retrieval systems propose the notion of query context to combine the knowledge of query and user into retrieval to reveal the most exact descripti...
Keke Cai, Chun Chen, Jiajun Bu, Peng Huang, Zhimin...
VLDB
2006
ACM
162views Database» more  VLDB 2006»
15 years 10 months ago
Dependency trees in sub-linear time and bounded memory
We focus on the problem of efficient learning of dependency trees. Once grown, they can be used as a special case of a Bayesian network, for PDF approximation, and for many other u...
Dan Pelleg, Andrew W. Moore
PERCOM
2005
ACM
15 years 9 months ago
MASTAQ: A Middleware Architecture for Sensor Applications with Statistical Quality Constraints
We present the design goals and functional components of MASTAQ, a data management middleware for pervasive applications that utilize sensor data. MASTAQ allows applications to sp...
Inseok Hwang, Qi Han, Archan Misra

Publication
545views
15 years 6 months ago
Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels
Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, mafia fraud and terrorist fraud attacks. Reid et al. proposed the first ...
A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, J....
ICC
2009
IEEE
135views Communications» more  ICC 2009»
15 years 4 months ago
Completion Time Minimization and Robust Power Control in Wireless Packet Networks
A wireless packet network is considered in which each user transmits a stream of packets to its destination. The transmit power of each user interferes with the transmission of al...
Chris T. K. Ng, Muriel Médard, Asuman E. Oz...