Sciweavers

987 search results - page 173 / 198
» Knowledge and social laws
Sort
View
76
Voted
ICDCS
2008
IEEE
15 years 4 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
81
Voted
ICDM
2007
IEEE
175views Data Mining» more  ICDM 2007»
15 years 4 months ago
gApprox: Mining Frequent Approximate Patterns from a Massive Network
Recently, there arise a large number of graphs with massive sizes and complex structures in many new applications, such as biological networks, social networks, and the Web, deman...
Chen Chen, Xifeng Yan, Feida Zhu, Jiawei Han
ICRA
2007
IEEE
164views Robotics» more  ICRA 2007»
15 years 4 months ago
Affect Recognition in Robot Assisted Rehabilitation of Children with Autism Spectrum Disorder
–This paper presents a novel affect-sensitive human-robot interaction framework for rehabilitation of children with autism spectrum disorder (ASD). The overall aim is to enable t...
Changchun Liu, Karla Conn, Nilanjan Sarkar, Wendy ...
IEEESCC
2007
IEEE
15 years 4 months ago
Business-Activity Driven Search: Addressing the Information Needs of Services Professionals
Services business generates significant amount of human and machine created data. Search and discovery of relevant information from this data is a critical factor in enhancing wor...
Nithya Rajamani, Murthy V. Devarakonda, Yu Deng, W...
73
Voted
INFOCOM
2007
IEEE
15 years 4 months ago
Optimal Pricing in a Free Market Wireless Network
We consider an ad-hoc wireless network operating within a free market economic model. Users send data over a choice of paths, and scheduling and routing decisions are updated dyna...
Michael J. Neely