Sciweavers

978 search results - page 141 / 196
» Knowledge, Probability, and Adversaries
Sort
View
INFOCOM
2009
IEEE
15 years 4 months ago
Opportunistic Processing and Query of Motion Trajectories in Wireless Sensor Networks
—We study the problem of in-network processing and queries of trajectories of moving targets in a sensor network. The main idea is to exploit the spatial coherence of target traj...
Dengpan Zhou, Jie Gao
SIGECOM
2009
ACM
95views ECommerce» more  SIGECOM 2009»
15 years 4 months ago
Eliciting truthful answers to multiple-choice questions
Motivated by the prevalence of online questionnaires in electronic commerce, and of multiple-choice questions in such questionnaires, we consider the problem of eliciting truthful...
Nicolas S. Lambert, Yoav Shoham
ACSAC
2008
IEEE
15 years 4 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
CISS
2008
IEEE
15 years 4 months ago
Unsupervised distributional anomaly detection for a self-diagnostic speech activity detector
— One feature that classification algorithms typically lack is the ability to know what they do not know. With this knowledge an algorithm would be able to operate in any domain...
Nash M. Borges, Gerard G. L. Meyer
CISS
2008
IEEE
15 years 4 months ago
Dynamic data compression for wireless transmission over a fading channel
—We consider a wireless node that randomly receives data from different sensor units. The arriving data must be compressed, stored, and transmitted over a wireless link, where bo...
Michael J. Neely