Sciweavers

306 search results - page 52 / 62
» Topological relationships between brain and social networks
Sort
View
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 9 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
ICPR
2010
IEEE
14 years 2 months ago
Sensor Fusion for Cooperative Head Localization
—In modern video surveillance systems, pan–tilt– zoom (PTZ) cameras certainly have the potential to allow the coverage of wide areas with a much smaller number of sensors, co...
Alberto Del Bimbo, Fabrizio Dini, Giuseppe Lisanti...
IMC
2010
ACM
13 years 5 months ago
Network tomography on correlated links
Network tomography establishes linear relationships between the characteristics of individual links and those of end-toend paths. It has been proved that these relationships can b...
Denisa Ghita, Katerina J. Argyraki, Patrick Thiran
WIOPT
2010
IEEE
13 years 6 months ago
Reservation policies for revenue maximization from secondary spectrum access in cellular networks
We consider the problem of providing opportunistic spectrum access to secondary users in wireless cellular networks. From the standpoint of spectrum license holders, achieving ben...
Ashraf Al Daoud, Murat Alanyali, David Starobinski
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox