Sciweavers

1763 search results - page 297 / 353
» Scientific Data Collections and Distributed Collective Pract...
Sort
View
115
Voted
WISEC
2010
ACM
15 years 21 days ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
97
Voted
APIN
2007
118views more  APIN 2007»
15 years 19 days ago
Using genetic algorithms to reorganize superpeer structure in peer to peer networks
In this thesis, we describe a genetic algorithm for optimizing the superpeer structure of semantic peer to peer networks. Peer to peer, also called P2P, networks enable us to sear...
Jaymin Kessler, Khaled Rasheed, Ismailcem Budak Ar...
103
Voted
CN
2006
89views more  CN 2006»
15 years 16 days ago
A flexible concast-based grouping service
Abstract. We present a scalable and flexible grouping service based on concast and best-effort single-source multicast. The service assigns participating end systems to specific gr...
Amit Sehgal, Kenneth L. Calvert, Jim Griffioen
CORR
2006
Springer
82views Education» more  CORR 2006»
15 years 16 days ago
Mapping the Bid Behavior of Conference Referees
The peer-review process, in its present form, has been repeatedly criticized. Of the many critiques ranging from publication delays to referee bias, this paper will focus specific...
Marko A. Rodriguez, Johan Bollen, Herbert Van de S...
ESWA
2006
149views more  ESWA 2006»
15 years 15 days ago
An effective refinement strategy for KNN text classifier
Due to the exponential growth of documents on the Internet and the emergent need to organize them, the automated categorization of documents into predefined labels has received an...
Songbo Tan