Sciweavers

534 search results - page 79 / 107
» Power from Random Strings
Sort
View
ICMCS
2007
IEEE
112views Multimedia» more  ICMCS 2007»
14 years 4 months ago
Detecting Unsafe Driving Patterns using Discriminative Learning
We propose a discriminative learning approach for fusing multichannel sequential data with application to detect unsafe driving patterns from multi-channel driving recording data....
Yue Zhou, Wei Xu, Huazhong Ning, Yihong Gong, Thom...
ISM
2006
IEEE
253views Multimedia» more  ISM 2006»
14 years 3 months ago
Gossip Based Streaming with Incentives for Peer Collaboration
— Peer-to-peer (P2P) systems are becoming a popular means of streaming audio and video content but they are prone to bandwidth starvation if selfish peers do not contribute band...
Sachin Agarwal, Shruti Dube
ISPEC
2005
Springer
14 years 3 months ago
Token-Controlled Public Key Encryption
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
ICPPW
2002
IEEE
14 years 2 months ago
Statistical Analysis of Connectivity in Unidirectional Ad Hoc Networks
A unidirectional link exists in an ad-hoc network when a node B is within the transmission range of another node A while node A cannot directly hear node B. However, a reverse rou...
Venugopalan Ramasubramanian, Daniel Mossé
SDM
2007
SIAM
73views Data Mining» more  SDM 2007»
13 years 11 months ago
Sketching Landscapes of Page Farms
The Web is a very large social network. It is important and interesting to understand the “ecology” of the Web: the general relations of Web pages to their environment. The un...
Bin Zhou 0002, Jian Pei