Sciweavers

1580 search results - page 242 / 316
» Non-Interference Through Determinism
Sort
View
JCP
2007
121views more  JCP 2007»
13 years 10 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
NETWORK
2007
234views more  NETWORK 2007»
13 years 9 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
PR
2007
146views more  PR 2007»
13 years 9 months ago
ML-KNN: A lazy learning approach to multi-label learning
Abstract: Multi-label learning originated from the investigation of text categorization problem, where each document may belong to several predefined topics simultaneously. In mul...
Min-Ling Zhang, Zhi-Hua Zhou
RAS
2008
80views more  RAS 2008»
13 years 9 months ago
Motion design and learning of autonomous robots based on primitives and heuristic cost-to-go
The task of trajectory design of autonomous vehicles is typically two-fold. First, it needs to take into account the intrinsic dynamics of the vehicle, which are sometimes termed ...
Keyong Li, Raffaello D'Andrea
NAS
2010
IEEE
13 years 8 months ago
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment
—In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is di...
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu