Sciweavers

7544 search results - page 1333 / 1509
» Network Forensics Analysis
Sort
View
156
Voted
ICUIMC
2009
ACM
15 years 11 months ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
SIGECOM
2009
ACM
114views ECommerce» more  SIGECOM 2009»
15 years 11 months ago
Policy teaching through reward function learning
Policy teaching considers a Markov Decision Process setting in which an interested party aims to influence an agent’s decisions by providing limited incentives. In this paper, ...
Haoqi Zhang, David C. Parkes, Yiling Chen
WOWMOM
2009
ACM
191views Multimedia» more  WOWMOM 2009»
15 years 11 months ago
Multi-channel spectrum-agile MAC protocol with adaptive load control
Abstract— Spectrum-agile radios, also known as cognitive radios, have a great potential to improve spectrum utilization by enabling dynamic access to the spectrum. A key challeng...
Fan Wang, Marwan Krunz
BIBM
2008
IEEE
142views Bioinformatics» more  BIBM 2008»
15 years 11 months ago
Using Global Sequence Similarity to Enhance Biological Sequence Labeling
Identifying functionally important sites from biological sequences, formulated as a biological sequence labeling problem, has broad applications ranging from rational drug design ...
Cornelia Caragea, Jivko Sinapov, Drena Dobbs, Vasa...
GLOBECOM
2008
IEEE
15 years 11 months ago
Characterization of Relay Channels Using the Bhattacharyya Parameter
—Relay systems have large and complex parameter spaces, which makes it difficult to determine the parameter region where the system achieves a given performance criterion, such ...
Josephine P. K. Chu, Andrew W. Eckford, Raviraj S....
« Prev « First page 1333 / 1509 Last » Next »