Sciweavers

1327 search results - page 93 / 266
» Citing for high impact
Sort
View
JSAC
2006
127views more  JSAC 2006»
15 years 4 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
177
Voted
CIKM
2010
Springer
15 years 3 months ago
Detecting product review spammers using rating behaviors
This paper aims to detect users generating spam reviews or review spammers. We identify several characteristic behaviors of review spammers and model these behaviors so as to dete...
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Li...
EVOW
2010
Springer
15 years 2 months ago
Coevolutionary Dynamics of Interacting Species
One of the open questions in evolutionary computation is how an arms race may be initiated between coevolving entities such that the entities acquire new behaviors and increase in ...
Marc Ebner, Richard A. Watson, Jason Alexander
CORR
2010
Springer
186views Education» more  CORR 2010»
14 years 11 months ago
QoS Routing in Smart Grid
Smart grid is an emerging technology which is able to control the power load via price signaling. The communication between the power supplier and power customers is a key issue in...
Husheng Li, Weiyi Zhang
TWC
2010
14 years 11 months ago
Enhancing cell-edge performance: a downlink dynamic interference avoidance scheme with inter-cell coordination
Interference management has been a key concept for designing future high data-rate wireless systems that are required to employ dense reuse of spectrum. Static or semistatic interf...
Mahmudur Rahman, Halim Yanikomeroglu