Sciweavers

2347 search results - page 305 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
AI
2010
Springer
13 years 3 months ago
Robustness of Classifiers to Changing Environments
Abstract. In this paper, we test some of the most commonly used classifiers to identify which ones are the most robust to changing environments. The environment may change over tim...
Houman Abbasian, Chris Drummond, Nathalie Japkowic...
CCR
2011
13 years 3 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 3 months ago
Robust Matrix Completion with Corrupted Columns
This paper considers the problem of matrix completion, when some number of the columns are arbitrarily corrupted, potentially by a malicious adversary. It is well-known that stand...
Yudong Chen, Huan Xu, Constantine Caramanis, Sujay...
JNS
2011
77views more  JNS 2011»
13 years 3 months ago
Nonlinear Dynamics of the 3D Pendulum
A 3D pendulum consists of a rigid body, supported at a fixed pivot, with three rotational degrees of freedom. The pendulum is acted on by a gravitational force. Symmetry assumptio...
Nalin A. Chaturvedi, Taeyoung Lee, Melvin Leok, N....
TMC
2011
164views more  TMC 2011»
13 years 3 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger