Sciweavers

4007 search results - page 544 / 802
» Computation with imprecise probabilities
Sort
View
WCNC
2010
IEEE
15 years 8 months ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
GROUP
2007
ACM
15 years 8 months ago
Creating, destroying, and restoring value in wikipedia
Wikipedia's brilliance and curse is that any user can edit any of the encyclopedia entries. We introduce the notion of the impact of an edit, measured by the number of times ...
Reid Priedhorsky, Jilin Chen, Shyong K. Lam, Kathe...
GI
2009
Springer
15 years 8 months ago
Parallelised Gaussian Mixture Filtering for Vehicular Traffic Flow Estimation
: Large traffic network systems require handling huge amounts of data, often distributed over a large geographical region in space and time. Centralised processing is not then the ...
Lyudmila Mihaylova, Amadou Gning, Viktor Doychinov...
ACCV
2006
Springer
15 years 8 months ago
Complex Activity Representation and Recognition by Extended Stochastic Grammar
Stochastic grammar has been used in many video analysis and event recognition applications as an efficient model to represent large-scale video activity. However, in previous works...
Zhang Zhang, Kaiqi Huang, Tieniu Tan
ACSC
2004
IEEE
15 years 8 months ago
Lossless Image Compression Using Pixel Reordering
Lossless image compression techniques typically consider images to be a sequence of pixels in row major order. The processing of each pixel consists of two separate operations. Th...
Michael Ciavarella, Alistair Moffat