Sciweavers

1485 search results - page 233 / 297
» connection 2010
Sort
View
GLOBECOM
2010
IEEE
14 years 10 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
GLOBECOM
2010
IEEE
14 years 10 months ago
Multicasting in Delay Tolerant Networks: Delegation Forwarding
Delay tolerant networks (DTNs) are a kind of wireless mobile network which may lack continuous network connectivity. Multicast supports the distribution of data to a group of users...
Yunsheng Wang, Xiaoguang Li, Jie Wu
ICCAD
2010
IEEE
146views Hardware» more  ICCAD 2010»
14 years 9 months ago
Through-silicon-via management during 3D physical design: When to add and how many?
In 3D integrated circuits through silicon vias (TSVs) are used to connect different dies stacked on top of each other. These TSV occupy silicon area and have significantly larger a...
Mohit Pathak, Young-Joon Lee, Thomas Moon, Sung Ky...
ICDE
2010
IEEE
174views Database» more  ICDE 2010»
14 years 9 months ago
Semantic flooding: Search over semantic links
Abstract-- Classification hierarchies are trees where links codify the fact that a node lower in the hierarchy contains documents whose contents are more specific than those one le...
Fausto Giunchiglia, Uladzimir Kharkevich, Alethia ...
ICDM
2010
IEEE
166views Data Mining» more  ICDM 2010»
14 years 9 months ago
Exponential Family Tensor Factorization for Missing-Values Prediction and Anomaly Detection
In this paper, we study probabilistic modeling of heterogeneously attributed multi-dimensional arrays. The model can manage the heterogeneity by employing an individual exponential...
Kohei Hayashi, Takashi Takenouchi, Tomohiro Shibat...