Sciweavers

796 search results - page 151 / 160
» Spoofing prevention method
Sort
View
IJCAI
1989
13 years 11 months ago
Recognizing Unnecessary Inference
Intelligent reasoners sometimes draw conclusions that lack new or relevant information. Similarly, automated reasoning systems can produce formulas that are not necessary for the ...
Dan Benanav
WCE
2007
13 years 11 months ago
The Dynamic Spatial Disaggregation Approach: A Spatio-Temporal Modelling of Crime
— The spatio-temporal modelling and forecasting of incidences of crimes have now become a routine part of crime prevention operations. However, obtaining reliable forecasts for c...
Christian Ivaha, Hasan Al-Madfai, Gary Higgs, J. A...
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
13 years 10 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
CMS
2010
149views Communications» more  CMS 2010»
13 years 10 months ago
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
Abstract. Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible...
Ge Zhang, Simone Fischer-Hübner
ADHOC
2007
109views more  ADHOC 2007»
13 years 10 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang