Sciweavers

145 search results - page 21 / 29
» A Subspace Approach to Layer Extraction
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
ICANN
2007
Springer
13 years 11 months ago
An Efficient Search Strategy for Feature Selection Using Chow-Liu Trees
Within the taxonomy of feature extraction methods, recently the Wrapper approaches lost some popularity due to the associated computational burden, compared to Embedded or Filter m...
Erik Schaffernicht, Volker Stephan, Horst-Michael ...
MHCI
2009
Springer
14 years 2 months ago
Mobile educational game: adventure anywhere
Main topic of this work is development of educational games that can be used on mobile devices. Paper describes a novel approach to educational game defining and interpretation. I...
Milos Milovanovic, Miroslav Minovic, Miroslav Lazo...
DAS
2008
Springer
13 years 9 months ago
Named Entity Recognition by Neural Sliding Window
Named Entity Recognition (NER) is an important subtask of document processing such as Information Extraction. This paper describes a NER algorithm which uses a Multi-Layer Percept...
Ignazio Gallo, Elisabetta Binaghi, Moreno Carullo,...
CONEXT
2008
ACM
13 years 9 months ago
Internet traffic classification demystified: myths, caveats, and the best practices
Recent research on Internet traffic classification algorithms has yielded a flurry of proposed approaches for distinguishing types of traffic, but no systematic comparison of the ...
Hyunchul Kim, Kimberly C. Claffy, Marina Fomenkov,...