Sciweavers

301 search results - page 26 / 61
» Reconsidering Network Effect Theory
Sort
View
118
Voted
IPPS
2007
IEEE
15 years 9 months ago
Distributed, Reliable Restoration Techniques using Wireless Sensor Devices
Wireless sensor networks are small, inexpensive and flexible computational platforms, that have found popular applications in various areas including environmental monitoring, he...
Yannis Drougas, Vana Kalogeraki
121
Voted
ECTEL
2006
Springer
15 years 7 months ago
Bayesian Student Models Based on Item to Item Knowledge Structures
Bayesian networks are commonly used in cognitive student modeling and assessment. They typically represent the item-concepts relationships, where items are observable responses to ...
Michel Desmarais, Michel Gagnon
160
Voted
MEDIAFORENSICS
2010
15 years 5 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
152
Voted
MOBIHOC
2010
ACM
15 years 1 months ago
The intrusion detection in mobile sensor network
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
Gabriel Yik Keung, Bo Li, Qian Zhang
146
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
Construction algorithms for k-connected m-dominating sets in wireless sensor networks
A Connected Dominating Set (CDS) working as a virtual backbone is an effective way to decrease the overhead of routing in a wireless sensor network. Furthermore, a kConnected m-Do...
Yiwei Wu, Yingshu Li