Sciweavers

344 search results - page 62 / 69
» Network Fusion
Sort
View
SERSCISA
2009
Springer
14 years 2 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
ICCD
2002
IEEE
164views Hardware» more  ICCD 2002»
14 years 4 months ago
Locating Tiny Sensors in Time and Space: A Case Study
— As the cost of embedded sensors and actuators drops, new applications will arise that exploit high density networks of small devices capable of a variety of sensing tasks. Alth...
Lewis Girod, Vladimir Bychkovskiy, Jeremy Elson, D...
MHCI
2009
Springer
14 years 2 months ago
Using semantic descriptions for adaptive mobile games UIs
Mobile devices became powerful recently and wireless Internet access is becoming standard. One important class of networked, mobile applications are location based games, making e...
Pascal Bihler, Holger Mügge, Mark Schmatz, Ar...
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 2 months ago
Sending Correlated Gaussian Sources over a Gaussian MAC: To Code, or not to Code
— We consider 1-helper problem in which one source provides partial side information to the fusion center (FC) to help reconstruction of the main source signal. Both sources comm...
Hamid Behroozi, M. Reza Soleymani
IJCNN
2007
IEEE
14 years 2 months ago
Two-stage Multi-class AdaBoost for Facial Expression Recognition
— Although AdaBoost has achieved great success, it still suffers from following problems: (1) the training process could be unmanageable when the number of features is extremely ...
Hongbo Deng, Jianke Zhu, Michael R. Lyu, Irwin Kin...