Sciweavers

161 search results - page 24 / 33
» Combining Algorithms for Deciding Knowledge in Security Prot...
Sort
View
EIT
2008
IEEE
14 years 1 months ago
Defending selective forwarding attacks in WMNs
—Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supp...
Devu Manikantan Shila, Tricha Anjali
SIGIR
2009
ACM
14 years 2 months ago
Link analysis for private weighted graphs
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
Jun Sakuma, Shigenobu Kobayashi
IROS
2008
IEEE
156views Robotics» more  IROS 2008»
14 years 1 months ago
Bayesian state estimation and behavior selection for autonomous robotic exploration in dynamic environments
— In order to be truly autonomous, robots that operate in natural, populated environments must have the ability to create a model of these unpredictable dynamic environments and ...
Georgios Lidoris, Dirk Wollherr, Martin Buss
ICLP
2005
Springer
14 years 1 months ago
OWL: A Description Logic Based Ontology Language
Abstract Description Logics (DLs) are a family of class (concept) based knowledge representation formalisms. They are characterised by the use of various constructors to build comp...
Ian Horrocks
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
11 years 10 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke