Sciweavers

3495 search results - page 694 / 699
» On the random satisfiable process
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping
Abstract—With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are hig...
Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu
JOCN
2010
105views more  JOCN 2010»
13 years 8 months ago
Brain Structures Involved in Visual Search in the Presence and Absence of Color Singletons
■ It is still debated to what degree top–down and bottom–up driven attentional control processes are subserved by shared or by separate mechanisms. Interactions between thes...
Durk Talsma, Brian Coe, Douglas P. Munoz, Jan Thee...
RCIS
2010
13 years 8 months ago
A Tree-based Approach for Efficiently Mining Approximate Frequent Itemsets
—The strategies for mining frequent itemsets, which is the essential part of discovering association rules, have been widely studied over the last decade. In real-world datasets,...
Jia-Ling Koh, Yi-Lang Tu
GLOBECOM
2010
IEEE
13 years 7 months ago
Automatic Gain Control for ADC-Limited Communication
As the date rates and bandwidths of communication systems scale up, the cost and power consumption of highprecision (e.g., 8-12 bits) analog-to-digital converters (ADCs) become pro...
Feifei Sun, Jaspreet Singh, Upamanyu Madhow
MOBIHOC
2010
ACM
13 years 7 months ago
The intrusion detection in mobile sensor network
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
Gabriel Yik Keung, Bo Li, Qian Zhang