Sciweavers

20807 search results - page 4129 / 4162
» How to read a paper
Sort
View
SOCIALCOM
2010
13 years 3 months ago
Learning Influence Propagation of Personal Blogs with Content and Network Analyses
Weblogs (blogs) serve as a gateway to a large blog reader population, so blog authors can potentially influence a large reader population by expressing their thoughts and expertise...
Il-Chul Moon, Dongwoo Kim, Yohan Jo, Alice H. Oh
TASE
2010
IEEE
13 years 3 months ago
Robust Calibration for Localization in Clustered Wireless Sensor Networks
This paper presents a robust calibration procedure for clustered wireless sensor networks. Accurate calibration of between-node distances is one crucial step in localizing sensor n...
Jung Jin Cho, Yu Ding, Yong Chen, Jiong Tang
TC
2010
13 years 3 months ago
SALSA: Strategyproof Online Spectrum Admissions for Wireless Networks
It is imperative to design efficient and effective online spectrum allocation methods since requests for spectrums often come in an online fashion. In this paper, we propose SALSA,...
Ping Xu, ShiGuang Wang, Xiang-Yang Li
TIFS
2010
143views more  TIFS 2010»
13 years 3 months ago
Face verification across age progression using discriminative methods
Face verification in the presence of age progression is an important problem that has not been widely addressed. In this paper, we study the problem by designing and evaluating dis...
Haibin Ling, Stefano Soatto, Narayanan Ramanathan,...
TIFS
2010
130views more  TIFS 2010»
13 years 3 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
« Prev « First page 4129 / 4162 Last » Next »