Sciweavers

14649 search results - page 2890 / 2930
» Principles of problem solving
Sort
View
COMCOM
2008
145views more  COMCOM 2008»
13 years 8 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
COMGEO
2008
ACM
13 years 8 months ago
Optimal location of transportation devices
We consider algorithms for finding the optimal location of a simple transportation device, that we call a moving walkway, consisting of a pair of points in the plane between which ...
Jean Cardinal, Sébastien Collette, Ferran H...
COR
2008
116views more  COR 2008»
13 years 8 months ago
Supply disruptions with time-dependent parameters
We consider a firm that faces random demand and receives product from a single supplier who faces random supply. The supplier's availability may be affected by events such as...
Andrew M. Ross, Ying Rong, Lawrence V. Snyder
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 8 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
CSL
2010
Springer
13 years 8 months ago
Speech separation using speaker-adapted eigenvoice speech models
We present a system for model-based source separation for use on single channel speech mixtures where the precise source characteristics are not known a priori. The sources are mo...
Ron J. Weiss, Daniel P. W. Ellis
« Prev « First page 2890 / 2930 Last » Next »