Sciweavers

2028 search results - page 308 / 406
» Highly Predictive Blacklisting
Sort
View
134
Voted
MDM
2010
Springer
250views Communications» more  MDM 2010»
15 years 5 months ago
Defending Wireless Sensor Networks against Adversarial Localization
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
Neelanjana Dutta, Abhinav Saxena, Sriram Chellappa...
187
Voted
ASPDAC
2005
ACM
133views Hardware» more  ASPDAC 2005»
15 years 5 months ago
A novel O(n) parallel banker's algorithm for System-on-a-Chip
This paper proposes a novel O(n) Parallel Banker’s Algorithm (PBA) with a best-case run-time of O(1), reduced from an ¢¤£¦¥¨§© run-time complexity of the original Ban...
Jaehwan John Lee, Vincent John Mooney III
136
Voted
PODC
2010
ACM
15 years 5 months ago
Brief announcement: revisiting the power-law degree distribution for social graph analysis
The study of complex networks led to the belief that the connectivity of network nodes generally follows a Power-law distribution. In this work, we show that modeling large-scale ...
Alessandra Sala, Haitao Zheng, Ben Y. Zhao, Sabrin...
114
Voted
COLT
2008
Springer
15 years 5 months ago
On the Equivalence of Weak Learnability and Linear Separability: New Relaxations and Efficient Boosting Algorithms
Boosting algorithms build highly accurate prediction mechanisms from a collection of lowaccuracy predictors. To do so, they employ the notion of weak-learnability. The starting po...
Shai Shalev-Shwartz, Yoram Singer
125
Voted
CONEXT
2008
ACM
15 years 5 months ago
Is there life in Second Life?
Abstract: Social virtual worlds such as Second Life are digital representations of the real world where human-controlled avatars evolve and interact through social activities. Unde...
Matteo Varvello, Fabio Picconi, Christophe Diot, E...