Sciweavers

866 search results - page 6 / 174
» Networked Slepian-Wolf: Theory and Algorithms
Sort
View
SEMWEB
2007
Springer
15 years 5 months ago
Using the Dempster-Shafer Theory of Evidence to Resolve ABox Inconsistencies
Abstract. Automated ontology population using information extraction algorithms can produce inconsistent knowledge bases. Confidence values assigned by the extraction algorithms m...
Andriy Nikolov, Victoria S. Uren, Enrico Motta, An...
103
Voted
CORR
2007
Springer
135views Education» more  CORR 2007»
14 years 11 months ago
Detailed Network Measurements Using Sparse Graph Counters: The Theory
— Measuring network flow sizes is important for tasks like accounting/billing, network forensics and security. Per-flow accounting is considered hard because it requires that m...
Yi Lu, Andrea Montanari, Balaji Prabhakar
80
Voted
AAAI
2006
15 years 1 months ago
Local Negotiation in Cellular Networks: From Theory to Practice
This paper describes a novel negotiation protocol for cellular networks, which intelligently improves the performance of the network. Our proposed reactive mechanism enables the d...
Raz Lin, Daphna Dor-Shifer, Sarit Kraus, David Sar...
APIN
2010
172views more  APIN 2010»
14 years 11 months ago
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System--in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor ...
Christian Wallenta, Jungwon Kim, Peter J. Bentley,...
PODC
2003
ACM
15 years 4 months ago
Geometric ad-hoc routing: of theory and practice
All too often a seemingly insurmountable divide between theory and practice can be witnessed. In this paper we try to contribute to narrowing this gap in the field of ad-hoc rout...
Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Z...