Sciweavers

108 search results - page 9 / 22
» Identifying sufficient statistics in information networks
Sort
View
ESORICS
2010
Springer
13 years 5 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
INFOSCALE
2006
ACM
14 years 1 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
IPMI
2009
Springer
14 years 10 days ago
Discovering Sparse Functional Brain Networks Using Group Replicator Dynamics (GRD)
Functional magnetic resonance imaging (fMRI) has become increasingly used for studying functional integration of the brain. However, the large inter-subject variability in function...
Bernard Ng, Rafeef Abugharbieh, Martin J. McKeown
LCN
2002
IEEE
14 years 19 days ago
Link Stability in Mobile Wireless Ad Hoc Networks
In this paper, we develop adaptive metrics to identify stable links in a mobile wireless networking environment based on the analysis of link durations in several different mobili...
Michael Gerharz, Christian de Waal, Matthias Frank...
SAINT
2008
IEEE
14 years 2 months ago
Dynamic Relay Node Placement in Wireless Sensor Networks
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Jorge Mena, Vana Kalogeraki