Sciweavers

1266 search results - page 191 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
VTC
2007
IEEE
166views Communications» more  VTC 2007»
15 years 10 months ago
Analysis of Non-Saturation and Saturation Performance of IEEE 802.11 DCF in the Presence of Hidden Stations
—In this paper, we propose an analytical model to evaluate the hidden station effect on both non-saturation and saturation performance of the IEEE 802.11 Distributed Coordination...
Fu-Yi Hung, Ivan Marsic
138
Voted
ADHOCNOW
2009
Springer
15 years 10 months ago
SenSearch: GPS and Witness Assisted Tracking for Delay Tolerant Sensor Networks
Abstract— Mobile wireless sensor networks have to be robust against the limitations of the underlying platform. While lightweight form factor makes them an attractive choice for ...
Lun Jiang, Jyh-How Huang, Ankur Kamthe, Tao Liu, I...
SGAI
2007
Springer
15 years 10 months ago
Expressive security policy rules using Layered Conceptual Graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language...
Madalina Croitoru, Liang Xiao 0002, David Dupplaw,...
AI
2001
Springer
15 years 8 months ago
A Case Study for Learning from Imbalanced Data Sets
We present our experience in applying a rule induction technique to an extremely imbalanced pharmaceutical data set. We focus on using a variety of performance measures to evaluate...
Aijun An, Nick Cercone, Xiangji Huang
99
Voted
CVPR
1997
IEEE
15 years 8 months ago
Photorealistic Scene Reconstruction by Voxel Coloring
A novel scene reconstruction technique is presented, different from previous approaches in its ability to cope with large changes in visibility and its modeling of intrinsic scene...
Steven M. Seitz, Charles R. Dyer