Sciweavers

14518 search results - page 2900 / 2904
» Two Problems for Sophistication
Sort
View
TMC
2012
11 years 10 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
EDBT
2012
ACM
291views Database» more  EDBT 2012»
11 years 10 months ago
Relevance search in heterogeneous networks
Conventional research on similarity search focuses on measuring the similarity between objects with the same type. However, in many real-world applications, we need to measure the...
Chuan Shi, Xiangnan Kong, Philip S. Yu, Sihong Xie...
ESORICS
2012
Springer
11 years 10 months ago
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris S...
AAAI
2012
11 years 10 months ago
A Testbed for Learning by Demonstration from Natural Language and RGB-Depth Video
We are developing a testbed for learning by demonstration combining spoken language and sensor data in a natural real-world environment. Microsoft Kinect RGBDepth cameras allow us...
Young Chol Song, Henry A. Kautz
AAAI
2012
11 years 10 months ago
Emoticon Smoothed Language Models for Twitter Sentiment Analysis
Twitter sentiment analysis (TSA) has become a hot research topic in recent years. The goal of this task is to discover the attitude or opinion of the tweets, which is typically fo...
Kun-Lin Liu, Wu-Jun Li, Minyi Guo
« Prev « First page 2900 / 2904 Last » Next »