Sciweavers

1663 search results - page 197 / 333
» Computer Security in the Real World
Sort
View
MOBIHOC
2001
ACM
16 years 3 months ago
Time synchronization in ad hoc networks
Ubiquitous computing environments are typically based upon ad hoc networks of mobile computing devices. These devices may be equipped with sensor hardware to sense the physical en...
Kay Römer
SAC
2010
ACM
15 years 11 months ago
Referrer graph: a low-cost web prediction algorithm
This paper presents the Referrer Graph (RG) web prediction algorithm as a low-cost solution to predict next web user accesses. RG is aimed at being used in a real web system with ...
B. de la Ossa, Ana Pont, Julio Sahuquillo, Jos&eac...
ICANNGA
2009
Springer
212views Algorithms» more  ICANNGA 2009»
15 years 10 months ago
Evolutionary Regression Modeling with Active Learning: An Application to Rainfall Runoff Modeling
Many complex, real world phenomena are difficult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a feasible alte...
Ivo Couckuyt, Dirk Gorissen, Hamed Rouhani, Eric L...
CVPR
2008
IEEE
15 years 10 months ago
View and scale invariant action recognition using multiview shape-flow models
Actions in real world applications typically take place in cluttered environments with large variations in the orientation and scale of the actor. We present an approach to simult...
Pradeep Natarajan, Ram Nevatia
IJCNN
2007
IEEE
15 years 10 months ago
TRUST-TECH Based Neural Network Training
— Efficient Training in a neural network plays a vital role in deciding the network architecture and the accuracy of these classifiers. Most popular local training algorithms t...
Hsiao-Dong Chiang, Chandan K. Reddy