Sciweavers

545 search results - page 60 / 109
» Modeling the tele-immersive systems using stochastic activit...
Sort
View
EUROPAR
2010
Springer
13 years 9 months ago
cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks
In a Cyclic Mobile Ad Hoc Network (CMANET) where nodes move cyclically, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggre...
Huanyu Zhao, Xin Yang, Xiaolin Li
ICPR
2010
IEEE
13 years 11 months ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
AEI
2007
119views more  AEI 2007»
13 years 8 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
ICANN
2009
Springer
13 years 5 months ago
Mental Tasks Classification for a Noninvasive BCI Application
Mapping brain activity patterns in external actions has been studied in recent decades and is the base of a brain-computer interface. This type of interface is extremely useful for...
Alexandre Ormiga G. Barbosa, David Ronald A. Diaz,...
WSC
1997
13 years 9 months ago
Using Compensating Reconfiguration to Maintain Military Distributed Simulations
In Department of Defense (DoD) distributed training simulations, events occur that can cause unrealistic behavior. These events can be system events, such as the loss of a hostor ...
Donald J. Welch, James M. Purtilo