Sciweavers

4324 search results - page 677 / 865
» Online social networks
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 3 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
TMC
2008
123views more  TMC 2008»
15 years 1 months ago
Learning Adaptive Temporal Radio Maps for Signal-Strength-Based Location Estimation
In wireless networks, a client's locations can be estimated using signal strength received from signal transmitters. Static fingerprint-based techniques are commonly used for ...
Jie Yin, Qiang Yang, Lionel M. Ni
TSMC
1998
139views more  TSMC 1998»
15 years 1 months ago
A neuro-fuzzy controller for mobile robot navigation and multirobot convoying
—A Neural integrated Fuzzy conTroller (NiF-T) which integrates the fuzzy logic representation of human knowledge with the learning capability of neural networks is developed for ...
Kim C. Ng, Mohan M. Trivedi
TMA
2010
Springer
137views Management» more  TMA 2010»
14 years 11 months ago
K-Dimensional Trees for Continuous Traffic Classification
Abstract. The network measurement community has proposed multiple machine learning (ML) methods for traffic classification during the last years. Although several research works ha...
Valentín Carela-Español, Pere Barlet...
DMTCS
2010
146views Mathematics» more  DMTCS 2010»
14 years 11 months ago
Tight Bounds for Delay-Sensitive Aggregation
This paper studies the fundamental trade-off between communication cost and delay cost arising in various contexts such as control message aggregation or organization theory. An o...
Yvonne Anne Pignolet, Stefan Schmid, Roger Wattenh...