Sciweavers

341 search results - page 43 / 69
» Permeability Analysis based on information granulation theor...
Sort
View
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
15 years 4 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong
ADVAI
2010
110views more  ADVAI 2010»
14 years 4 months ago
Using Genetic Algorithms to Represent Higher-Level Planning in Simulation Models of Conflict
The focus of warfare has shifted from the Industrial Age to the Information Age, as encapsulated by the term Network Enabled Capability. This emphasises information sharing, comma...
James Moffat, Susan Fellows
SIGIR
2008
ACM
14 years 9 months ago
Directly optimizing evaluation measures in learning to rank
One of the central issues in learning to rank for information retrieval is to develop algorithms that construct ranking models by directly optimizing evaluation measures used in i...
Jun Xu, Tie-Yan Liu, Min Lu, Hang Li, Wei-Ying Ma
ICASSP
2011
IEEE
14 years 1 months ago
On optimal channel training for uplink network MIMO systems
We study a multi-cell frequency-selective fading uplink channel from K user terminals (UTs) to B base stations (BSs). The BSs, assumed to be oblivious of the applied encoding sche...
Jakob Hoydis, Mari Kobayashi, Mérouane Debb...
WWW
2004
ACM
15 years 10 months ago
Propagation of trust and distrust
A (directed) network of people connected by ratings or trust scores, and a model for propagating those trust scores, is a fundamental building block in many of today's most s...
Ramanathan V. Guha, Ravi Kumar, Prabhakar Raghavan...