Sciweavers

1511 search results - page 255 / 303
» Active Risk Estimation
Sort
View
ICDCS
2006
IEEE
14 years 1 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...
IJCNN
2006
IEEE
14 years 1 months ago
Classifying Single-Trial ERPs from Visual and Frontal Cortex during Free Viewing
—Event-related potentials (ERPs) recorded at the scalp are indicators of brain activity associated with eventrelated information processing; hence they may be suitable for the as...
Akaysha C. Tang, Matthew T. Sutherland, Christophe...
IRI
2006
IEEE
14 years 1 months ago
Targeting and localization for mars rover operations
— In this work we discuss how the quality of localization knowledge impacts the remote operation of rovers on the surface of Mars. We look at the techniques of localization estim...
Mark W. Powell, Thomas Crockett, Jason Fox, Joseph...
ACIVS
2006
Springer
14 years 1 months ago
Discrete Choice Models for Static Facial Expression Recognition
In this paper we propose the use of Discrete Choice Analysis (DCA) for static facial expression classification. Facial expressions are described with expression descriptive units ...
Gianluca Antonini, Matteo Sorci, Michel Bierlaire,...
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu