Sciweavers

1683 search results - page 265 / 337
» The Crowd is a Collaborative Network
Sort
View
96
Voted
WIMOB
2008
IEEE
15 years 7 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
ICDM
2007
IEEE
124views Data Mining» more  ICDM 2007»
15 years 6 months ago
Local Probabilistic Models for Link Prediction
One of the core tasks in social network analysis is to predict the formation of links (i.e. various types of relationships) over time. Previous research has generally represented ...
Chao Wang, Venu Satuluri, Srinivasan Parthasarathy
104
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
Achieving Long-Term Surveillance in VigilNet
Abstract— Energy efficiency is a fundamental issue for outdoor sensor network systems. This paper presents the design and implementation of multi-dimensional power management st...
Tian He, Pascal Vicaire, Ting Yan, Qing Cao, Gang ...
INFOSCALE
2006
ACM
15 years 6 months ago
PENS: an algorithm for density-based clustering in peer-to-peer systems
Huge amounts of data are available in large-scale networks of autonomous data sources dispersed over a wide area. Data mining is an essential technology for obtaining hidden and v...
Mei Li, Guanling Lee, Wang-Chien Lee, Anand Sivasu...
95
Voted
HUC
2005
Springer
15 years 6 months ago
Picking Pockets on the Lawn: The Development of Tactics and Strategies in a Mobile Game
This paper presents Treasure, an outdoor mobile multiplayer game inspired by Weiser’s notion of seams, gaps and breaks in different media. Playing Treasure involves movement in a...
Louise Barkhuus, Matthew Chalmers, Paul Tennent, M...