Sciweavers

2028 search results - page 308 / 406
» Highly Predictive Blacklisting
Sort
View
MDM
2010
Springer
250views Communications» more  MDM 2010»
13 years 10 months ago
Defending Wireless Sensor Networks against Adversarial Localization
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
Neelanjana Dutta, Abhinav Saxena, Sriram Chellappa...
ASPDAC
2005
ACM
133views Hardware» more  ASPDAC 2005»
13 years 10 months ago
A novel O(n) parallel banker's algorithm for System-on-a-Chip
This paper proposes a novel O(n) Parallel Banker’s Algorithm (PBA) with a best-case run-time of O(1), reduced from an ¢¤£¦¥¨§© run-time complexity of the original Ban...
Jaehwan John Lee, Vincent John Mooney III
PODC
2010
ACM
13 years 9 months ago
Brief announcement: revisiting the power-law degree distribution for social graph analysis
The study of complex networks led to the belief that the connectivity of network nodes generally follows a Power-law distribution. In this work, we show that modeling large-scale ...
Alessandra Sala, Haitao Zheng, Ben Y. Zhao, Sabrin...
COLT
2008
Springer
13 years 9 months ago
On the Equivalence of Weak Learnability and Linear Separability: New Relaxations and Efficient Boosting Algorithms
Boosting algorithms build highly accurate prediction mechanisms from a collection of lowaccuracy predictors. To do so, they employ the notion of weak-learnability. The starting po...
Shai Shalev-Shwartz, Yoram Singer
CONEXT
2008
ACM
13 years 9 months ago
Is there life in Second Life?
Abstract: Social virtual worlds such as Second Life are digital representations of the real world where human-controlled avatars evolve and interact through social activities. Unde...
Matteo Varvello, Fabio Picconi, Christophe Diot, E...