Sciweavers

1541 search results - page 158 / 309
» Analysis of Random Noise and Random Walk Algorithms
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
INFOCOM
2011
IEEE
12 years 11 months ago
Optimal multicast capacity and delay tradeoffs in MANETs: A global perspective
—In this paper, we give a global perspective of multicast capacity and delay analysis in Mobile Ad-hoc Networks (MANETs). Specifically, we consider two node mobility models: (1)...
Yun Wang, Xiaoyu Chu, Xinbing Wang, Yu Cheng
KDD
2003
ACM
146views Data Mining» more  KDD 2003»
14 years 8 months ago
Probabilistic discovery of time series motifs
Several important time series data mining problems reduce to the core task of finding approximately repeated subsequences in a longer time series. In an earlier work, we formalize...
Bill Yuan-chi Chiu, Eamonn J. Keogh, Stefano Lonar...
IVC
1998
65views more  IVC 1998»
13 years 8 months ago
Segmentation of MR images with intensity inhomogeneities
A statistical model to segment clinical magnetic resonance (MR) images in the presence of noise and intensity inhomogeneities is proposed. Inhomogeneities are considered to be mul...
Jagath C. Rajapakse, Frithjof Kruggel
WWW
2006
ACM
14 years 9 months ago
Detecting nepotistic links by language model disagreement
In this short note we demonstrate the applicability of hyperlink downweighting by means of language model disagreement. The method filters out hyperlinks with no relevance to the ...
András A. Benczúr, István B&i...