Sciweavers

4049 search results - page 686 / 810
» Neural Network Trainer through Computer Networks
Sort
View
SIGECOM
2005
ACM
98views ECommerce» more  SIGECOM 2005»
15 years 8 months ago
Hidden-action in multi-hop routing
In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not th...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
DCOSS
2005
Springer
15 years 8 months ago
Design and Comparison of Lightweight Group Management Strategies in EnviroSuite
Tracking is one of the major applications of wireless sensor networks. EnviroSuite, as a programming paradigm, provides a comprehensive solution for programming tracking applicatio...
Liqian Luo, Tarek F. Abdelzaher, Tian He, John A. ...
SEKE
2005
Springer
15 years 8 months ago
Face Alive Icons
Facial expression is one of the primary communication means of the human. However, realistic facial expression images are not used in popular communication tools on portable devic...
Xin Li, Chieh-Chih Chang, Shi-Kuo Chang
SIGCOMM
2004
ACM
15 years 8 months ago
Optimizing cost and performance for multihoming
Multihoming is often used by large enterprises and stub ISPs to connect to the Internet. In this paper, we design a series of novel smart routing algorithms to optimize cost and p...
David Kiyoshi Goldenberg, Lili Qiu, Haiyong Xie 00...
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 7 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok