Sciweavers

17018 search results - page 3335 / 3404
» From the How to the What
Sort
View
IJDSN
2006
114views more  IJDSN 2006»
13 years 9 months ago
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure ...
Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrish...
IJHPCN
2006
106views more  IJHPCN 2006»
13 years 9 months ago
Performance evaluation of the Sun Fire Link SMP clusters
As symmetric multiprocessors become commonplace, the interconnection networks and the communication system software in clusters of multiprocessors become critical to achieving high...
Ying Qian, Ahmad Afsahi, Nathan R. Fredrickson, Re...
ISM
2008
IEEE
273views Multimedia» more  ISM 2008»
13 years 9 months ago
Understanding Data-Driven Decision Support Systems
It is important for managers and Information Technology professionals to understand data-driven decision support systems and how such systems can provide business intelligence and ...
Daniel J. Power
IVC
2008
148views more  IVC 2008»
13 years 9 months ago
Cognitive vision: The case for embodied perception
This paper considers arguments for the necessity of embodiment in cognitive vision systems. We begin by delineating the scope of cognitive vision, and follow this by a survey of t...
David Vernon
JAIR
2008
135views more  JAIR 2008»
13 years 9 months ago
On Similarities between Inference in Game Theory and Machine Learning
In this paper, we elucidate the equivalence between inference in game theory and machine learning. Our aim in so doing is to establish an equivalent vocabulary between the two dom...
Iead Rezek, David S. Leslie, Steven Reece, Stephen...
« Prev « First page 3335 / 3404 Last » Next »