Sciweavers

3907 search results - page 656 / 782
» Time, Knowledge, and Choice
Sort
View
102
Voted
CIDM
2007
IEEE
15 years 29 days ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
127
Voted
GLOBECOM
2007
IEEE
15 years 28 days ago
Doppler Spread Estimation for Broadband Wireless OFDM Systems
Abstract— In this paper, we present a new Doppler spread estimation algorithm for broadband wireless orthogonal frequency division multiplexing (OFDM) systems with time-varying a...
Jun Tao, Jingxian Wu, Chengshan Xiao
ADHOC
2008
101views more  ADHOC 2008»
15 years 28 days ago
Monte Carlo localization for mobile wireless sensor networks
Localization is crucial to many applications in wireless sensor networks. In this article, we propose a range-free anchorbased localization algorithm for mobile wireless sensor ne...
Aline Baggio, Koen Langendoen
AI
2007
Springer
15 years 28 days ago
Head gestures for perceptual interfaces: The role of context in improving recognition
Head pose and gesture offer several conversational grounding cues and are used extensively in face-to-face interaction among people. To recognize visual feedback efficiently, hum...
Louis-Philippe Morency, Candace L. Sidner, Christo...
116
Voted
AIS
2007
Springer
15 years 28 days ago
Unplanned effects of intelligent agents on Internet use: a social informatics approach
This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens...
Alexander Serenko, Umar Ruhi, Mihail Cocosila