Sciweavers

903 search results - page 164 / 181
» Using Library Dependencies for Clustering
Sort
View
AIM
2011
12 years 11 months ago
Transfer Learning by Reusing Structured Knowledge
Transfer learning aims to solve new learning problems by extracting and making use of the common knowledge found in related domains. A key element of transfer learning is to ident...
Qiang Yang, Vincent Wenchen Zheng, Bin Li, Hankz H...
ICDCS
2011
IEEE
12 years 7 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
ISCC
2006
IEEE
188views Communications» more  ISCC 2006»
14 years 1 months ago
Active Learning Driven Data Acquisition for Sensor Networks
Online monitoring of a physical phenomenon over a geographical area is a popular application of sensor networks. Networks representative of this class of applications are typicall...
Anish Muttreja, Anand Raghunathan, Srivaths Ravi, ...
CMIG
2011
168views more  CMIG 2011»
12 years 11 months ago
Comparing axial CT slices in quantized N-dimensional SURF descriptor space to estimate the visible body region
In this paper, a method is described to automatically estimate the visible body region of a computed tomography (CT) volume image. In order to quantify the body region, a body coo...
Johannes Feulner, Shaohua Kevin Zhou, Elli Angelop...
CSFW
2009
IEEE
14 years 2 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...