Sciweavers

332 search results - page 63 / 67
» Identity Aware Sensor Networks
Sort
View
WS
2006
ACM
14 years 1 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
GPC
2009
Springer
13 years 10 months ago
Balanced Scheduling Algorithm Considering Availability in Mobile Grid
The emerging Grid is extending the scope of resources to mobile devices and sensors that are connected through unreliable networks. Nowadays the number of mobile device users is in...
JongHyuk Lee, SungJin Song, JoonMin Gil, KwangSik ...
NETWORK
2008
107views more  NETWORK 2008»
13 years 7 months ago
HiCon: a hierarchical context monitoring and composition framework for next-generation context-aware services
This article presents a hierarchical context monitoring and composition framework that effectively supports next-generation context-aware services. The upcoming ubiquitous space w...
Kyungmin Cho, Inseok Hwang, Seungwoo Kang, Byoungj...
ICML
2007
IEEE
14 years 8 months ago
Conditional random fields for multi-agent reinforcement learning
Conditional random fields (CRFs) are graphical models for modeling the probability of labels given the observations. They have traditionally been trained with using a set of obser...
Xinhua Zhang, Douglas Aberdeen, S. V. N. Vishwanat...
TIT
2008
103views more  TIT 2008»
13 years 7 months ago
Fast Distributed Algorithms for Computing Separable Functions
The problem of computing functions of values at the nodes in a network in a fully distributed manner, where nodes do not have unique identities and make decisions based only on loc...
Damon Mosk-Aoyama, Devavrat Shah