Sciweavers

19003 search results - page 3622 / 3801
» We Need Assurance!
Sort
View
TIFS
2010
130views more  TIFS 2010»
13 years 4 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
TSMC
2010
13 years 4 months ago
Cellular Learning Automata With Multiple Learning Automata in Each Cell and Its Applications
The cellular learning automaton (CLA), which is a4 combination of cellular automaton (CA) and learning automaton5 (LA), is introduced recently. This model is superior to CA because...
Hamid Beigy, Mohammad Reza Meybodi
TSP
2010
13 years 4 months ago
Channel energy based estimation of target trajectories using distributed sensors with low communication rate
Abstract--Sensor localization using channel energy measurements of distributed sensors has been studied in various scenarios. However, it is usually assumed that the target does no...
Christian R. Berger, Sora Choi, Shengli Zhou, Pete...
WINET
2010
178views more  WINET 2010»
13 years 4 months ago
Zero-configuration indoor localization over IEEE 802.11 wireless infrastructure
With the technical advances in ubiquitous computing and wireless networking, there has been an increasing need to capture the context information (such as the location) and to figu...
Hyuk Lim, Lu-Chuan Kung, Jennifer C. Hou, Haiyun L...
WWW
2011
ACM
13 years 4 months ago
Automatic construction of a context-aware sentiment lexicon: an optimization approach
The explosion of Web opinion data has made essential the need for automatic tools to analyze and understand people’s sentiments toward different topics. In most sentiment analy...
Yue Lu, Malú Castellanos, Umeshwar Dayal, C...
« Prev « First page 3622 / 3801 Last » Next »