Sciweavers

546 search results - page 48 / 110
» Using and Detecting Links in Wikipedia
Sort
View
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
14 years 5 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
EJWCN
2010
237views more  EJWCN 2010»
13 years 5 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
PCM
2005
Springer
122views Multimedia» more  PCM 2005»
14 years 4 months ago
A Scheme for Ball Detection and Tracking in Broadcast Soccer Video
In this paper we propose a scheme for ball detection and tracking in broadcast soccer video. There are two alternate procedures in the scheme: ball detection and ball tracking. In ...
Dawei Liang, Yang Liu, Qingming Huang, Wen Gao
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
14 years 13 days ago
A Spamicity Approach to Web Spam Detection
Web spam, which refers to any deliberate actions bringing to selected web pages an unjustifiable favorable relevance or importance, is one of the major obstacles for high quality ...
Bin Zhou 0002, Jian Pei, ZhaoHui Tang
AVI
2008
14 years 3 days ago
Visualizing program similarity in the Ac plagiarism detection system
Programming assignments are easy to plagiarize in such a way as to foil casual reading by graders. Graders can resort to automatic plagiarism detection systems, which can generate...
Manuel Freire