Sciweavers

4511 search results - page 828 / 903
» Observation Based System Security
Sort
View
ICASSP
2010
IEEE
14 years 10 months ago
Distributed learning in cognitive radio networks: Multi-armed bandit with distributed multiple players
—We consider a cognitive radio network with distributed multiple secondary users, where each user independently searches for spectrum opportunities in multiple channels without e...
Keqin Liu, Qing Zhao
CDC
2008
IEEE
217views Control Systems» more  CDC 2008»
14 years 10 months ago
An ensemble Kalman filtering approach to highway traffic estimation using GPS enabled mobile devices
Traffic state estimation is a challenging problem for the transportation community due to the limited deployment of sensing infrastructure. However, recent trends in the mobile pho...
Daniel B. Work, Olli-Pekka Tossavainen, Sebastien ...
IJVR
2006
142views more  IJVR 2006»
14 years 10 months ago
Garden Alive: an Emotionally Intelligent Interactive Garden
In this paper, we introduce the "Garden Alive" system that allows users to interact with an emotionally intelligent virtual garden by manipulating tangible user interface...
Taejin Ha, Woontack Woo
PE
2008
Springer
167views Optimization» more  PE 2008»
14 years 9 months ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi
TWC
2008
154views more  TWC 2008»
14 years 9 months ago
MEERA: Cross-Layer Methodology for Energy Efficient Resource Allocation in Wireless Networks
Abstract-- In many portable devices, wireless network interfaces consume upwards of 30% of scarce system energy. Reducing the transceiver's power consumption to extend the sys...
Sofie Pollin, Rahul Mangharam, Bruno Bougard, Lies...