Sciweavers

89222 search results - page 17679 / 17845
» Which
Sort
View
JDCTA
2010
119views more  JDCTA 2010»
13 years 5 months ago
Distributed Dual Cluster Algorithm Based on Grid for Sensor Streams
In practical applications, Wireless Sensor Networks generate massive data streams with the dual attributes in geography and optimization domain. Energy source of sensor nodes in W...
Jianghua Huang, Junying Zhang
JIPS
2010
389views more  JIPS 2010»
13 years 5 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
JIPS
2010
195views more  JIPS 2010»
13 years 5 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
JMLR
2010
118views more  JMLR 2010»
13 years 5 months ago
On Over-fitting in Model Selection and Subsequent Selection Bias in Performance Evaluation
Model selection strategies for machine learning algorithms typically involve the numerical optimisation of an appropriate model selection criterion, often based on an estimator of...
Gavin C. Cawley, Nicola L. C. Talbot
JMLR
2010
147views more  JMLR 2010»
13 years 5 months ago
Image Denoising with Kernels Based on Natural Image Relations
A successful class of image denoising methods is based on Bayesian approaches working in wavelet representations. The performance of these methods improves when relations among th...
Valero Laparra, Juan Gutierrez, Gustavo Camps-Vall...
« Prev « First page 17679 / 17845 Last » Next »