Sciweavers

4332 search results - page 608 / 867
» A Probabilistic Identification Result
Sort
View
GLOBECOM
2007
IEEE
15 years 11 months ago
Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks
Many of the routing protocols that have been designed for wireless ad-hoc networks focus on energy-efficiency and guaranteeing high throughput in a non-adversarial setting. Howev...
Tanya Roosta, Sameer Pai, Phoebus Chen, Shankar Sa...
131
Voted
ICDM
2007
IEEE
198views Data Mining» more  ICDM 2007»
15 years 11 months ago
Social Network Extraction of Academic Researchers
This paper addresses the issue of extraction of an academic researcher social network. By researcher social network extraction, we are aimed at finding, extracting, and fusing the...
Jie Tang, Duo Zhang, Limin Yao
136
Voted
IPCCC
2007
IEEE
15 years 11 months ago
Optimal Cluster Head Selection in the LEACH Architecture
LEACH (Low Energy Adaptive Clustering Hierarchy) [1] is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. LEACH uses a TDMA ...
Haiming Yang, Biplab Sikdar
SSDBM
2007
IEEE
124views Database» more  SSDBM 2007»
15 years 11 months ago
Incorporating Uncertainty Metrics into a General-Purpose Data Integration System
There is a significant need for data integration capabilities in the scientific domain, which has manifested itself as products in the commercial world as well as academia. Howeve...
Brenton Louie, Landon Detwiler, Nilesh N. Dalvi, R...
CIARP
2007
Springer
15 years 10 months ago
Human Detection in Indoor Environments Using Multiple Visual Cues and a Mobile Robot
In order to deploy mobile robots in social environments like indoor buildings, they need to be provided with perceptual abilities to detect people. In the computer vision literatur...
Stefan Pszczólkowski, Alvaro Soto