Sciweavers

3907 search results - page 656 / 782
» Time, Knowledge, and Choice
Sort
View
CIDM
2007
IEEE
13 years 9 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
GLOBECOM
2007
IEEE
13 years 9 months ago
Doppler Spread Estimation for Broadband Wireless OFDM Systems
Abstract— In this paper, we present a new Doppler spread estimation algorithm for broadband wireless orthogonal frequency division multiplexing (OFDM) systems with time-varying a...
Jun Tao, Jingxian Wu, Chengshan Xiao
ADHOC
2008
101views more  ADHOC 2008»
13 years 9 months ago
Monte Carlo localization for mobile wireless sensor networks
Localization is crucial to many applications in wireless sensor networks. In this article, we propose a range-free anchorbased localization algorithm for mobile wireless sensor ne...
Aline Baggio, Koen Langendoen
AI
2007
Springer
13 years 9 months ago
Head gestures for perceptual interfaces: The role of context in improving recognition
Head pose and gesture offer several conversational grounding cues and are used extensively in face-to-face interaction among people. To recognize visual feedback efficiently, hum...
Louis-Philippe Morency, Candace L. Sidner, Christo...
AIS
2007
Springer
13 years 9 months ago
Unplanned effects of intelligent agents on Internet use: a social informatics approach
This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens...
Alexander Serenko, Umar Ruhi, Mihail Cocosila