Sciweavers

3247 search results - page 647 / 650
» Randomized smoothing networks
Sort
View
JPDC
2007
112views more  JPDC 2007»
14 years 9 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
JSAC
2007
116views more  JSAC 2007»
14 years 9 months ago
Outreach: peer-to-peer topology construction towards minimized server bandwidth costs
Abstract— On-demand and live multimedia streaming applications (such as Internet TV) are well known to utilize a significant amount of bandwidth from media streaming servers, es...
Tara Small, Baochun Li, Ben Liang
TWC
2008
201views more  TWC 2008»
14 years 9 months ago
A Novel Algorithm for Multipath Fingerprinting in Indoor WLAN Environments
Abstract--Positioning in indoor wireless environments is growing rapidly in importance and gains commercial interests in context-awareness applications. The essential challenge in ...
Shih-Hau Fang, Tsung-Nan Lin, Kun-Chou Lee
88
Voted
VLSISP
2008
173views more  VLSISP 2008»
14 years 9 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee
IJPRAI
2000
62views more  IJPRAI 2000»
14 years 9 months ago
Knowledge-Guided Classification of Coastal Zone Color Images Off the West Florida Shelf
Abstract A knowledge-guided approach to automatic classification of Coastal Zone Color images of the West Florida Shelf is described. The approach is used to identify red tides on ...
Mingrui Zhang, Lawrence O. Hall, Dmitry B. Goldgof...