Sciweavers

3257 search results - page 126 / 652
» Some Results on Effective Randomness
Sort
View
COGSCI
2010
108views more  COGSCI 2010»
14 years 10 months ago
Do Grammars Minimize Dependency Length?
A well-established principle of language is that there is a preference for closely related words to be close together in the sentence. This can be expressed as a preference for de...
Daniel Gildea, David Temperley
JCM
2007
191views more  JCM 2007»
14 years 9 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
JSAC
2010
188views more  JSAC 2010»
14 years 4 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
CANDC
2002
ACM
14 years 9 months ago
Computer aided creativity: practical experience and theoretical concerns
In this paper I will outline some of the practical experiences and theoretical concerns that have informed some 15 years of research into the relationship between human creativity...
Robert Pepperell
ESORICS
2008
Springer
14 years 11 months ago
On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques
The evaluation of privacy-preserving techniques for LBS is often based on simulations of mostly random user movements that only partially capture real deployment scenarios. We clai...
Sergio Mascetti, Dario Freni, Claudio Bettini, Xia...