Sciweavers

496 search results - page 55 / 100
» Using Music as a Communication Medium
Sort
View
TFS
2011
242views Education» more  TFS 2011»
14 years 6 months ago
Linguistic Summarization Using IF-THEN Rules and Interval Type-2 Fuzzy Sets
—Linguistic summarization (LS) is a data mining or knowledge discovery approach to extract patterns from databases. Many authors have used this technique to generate summaries li...
Dongrui Wu, Jerry M. Mendel
SECON
2008
IEEE
15 years 6 months ago
Cooperative Recovery in Heterogeneous Mobile Networks
Abstract—In multicast/broadcast services over infrastructurebased/cellular wireless networks (e.g. 3G cellular networks, WiMax, DVB), data is transmitted to multiple recipients f...
Kaustubh Sinkar, Amit Jagirdar, Thanasis Korakis, ...
SSS
2009
Springer
123views Control Systems» more  SSS 2009»
15 years 6 months ago
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat
In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. I...
Márk Jelasity, Vilmos Bilicki
ISCC
2003
IEEE
15 years 5 months ago
Throughput Achievable with No Relaying in a Mobile Interference Network
— We consider a network of n sender/receiver pairs, placed randomly in a region of unit area. Network capacity, or maximum throughput, is defined as the highest rate that can be...
Elif Uysal-Biyikoglu, Abtin Keshavarzian
NDSS
2002
IEEE
15 years 4 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman