Sciweavers

233 search results - page 21 / 47
» Information theoretic novelty detection
Sort
View
IPCCC
2006
IEEE
14 years 2 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
JSAC
2011
191views more  JSAC 2011»
13 years 3 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz
IFIPTM
2010
113views Management» more  IFIPTM 2010»
13 years 7 months ago
Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems
Ranking systems such as those in product review sites and recommender systems usually use ratings to rank favorite items based on both their quality and popularity. Since higher ra...
Le-Hung Vu, Thanasis G. Papaioannou, Karl Aberer
ACMSE
2009
ACM
14 years 3 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
GI
2009
Springer
13 years 6 months ago
A Modular Framework to Detect and Analyze Faces for Audience Measurement Systems
: In this paper we describe an approach that enables the detection, tracking and fine analysis (classification of gender and facial expression) of faces using a single web camera. ...
Christian Küblbeck, Tobias Ruf, Andreas Ernst