Sciweavers

522 search results - page 32 / 105
» Necessary but Not Sufficient
Sort
View
EWSN
2009
Springer
14 years 8 months ago
Cooperative Intrusion Detection in Wireless Sensor Networks
We consider the problem of cooperative intrusion detection in wireless sensor networks where the nodes are equipped with local detector modules and have to identify the intruder in...
Ioannis Krontiris, Zinaida Benenson, Thanassis Gia...
GLOBECOM
2006
IEEE
14 years 1 months ago
Optimization on Hybrid Channel Assignment for Multi-channel Multi-radio Wireless Mesh Networks
The emergence of multi-channel multi-radio wireless mesh networks has given us many new opportunities and challenges. Particularly, the issue on how to appropriately assign channel...
Andy An-Kai Jeng, Rong-Hong Jan
ICARCV
2006
IEEE
84views Robotics» more  ICARCV 2006»
14 years 1 months ago
On the Form-Closure Capability of Robotic Underactuated Hands
—This paper presents a new method to study the capability of an underactuated hand to produce form-closed grasps. First, the stability behaviours of different underactuated paral...
Vincent Begoc, Claude Durand, Sébastien Kru...
ISIPTA
2005
IEEE
119views Mathematics» more  ISIPTA 2005»
14 years 1 months ago
Ordinal Subjective Foundations for Finite-domain Probability Agreement
Normative study of probability-agreeing orderings of propositions, much of it rooted in a false but evocative conjecture of Bruno de Finetti, has typically sought to credal ration...
Paul Snow
DAWAK
2005
Springer
14 years 1 months ago
FMC: An Approach for Privacy Preserving OLAP
To preserve private information while providing thorough analysis is one of the significant issues in OLAP systems. One of the challenges in it is to prevent inferring the sensitiv...
Ming Hua, Shouzhi Zhang, Wei Wang 0009, Haofeng Zh...