Sciweavers

139 search results - page 13 / 28
» cai 2007
Sort
View
IJSN
2007
82views more  IJSN 2007»
13 years 7 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen
WWW
2007
ACM
14 years 8 months ago
Bayesian network based sentence retrieval model
This paper makes an intensive investigation of the application of Bayesian network in sentence retrieval and introduces three Bayesian network based sentence retrieval models with...
Keke Cai, Jiajun Bu, Chun Chen, Kangmiao Liu, Wei ...
WWW
2007
ACM
14 years 8 months ago
Exploration of query context for information retrieval
A number of existing information retrieval systems propose the notion of query context to combine the knowledge of query and user into retrieval to reveal the most exact descripti...
Keke Cai, Chun Chen, Jiajun Bu, Peng Huang, Zhimin...
FGCN
2007
IEEE
149views Communications» more  FGCN 2007»
14 years 1 months ago
Cover Set Problem in Directional Sensor Networks
— A directional sensor network consists of a number of directional sensors, which can switch to several directions to extend their sensing ability to cover the interested targets...
Yanli Cai, Wei Lou, Minglu Li
ICC
2007
IEEE
14 years 1 months ago
Turbo Multiuser Detection Based on Local Search Algorithms
—The full-complexity soft-input/soft-output (SISO) multiuser detector based on the a posteriori probability (APP) algorithm has a computational complexity growing exponentially w...
Zhiliang Qin, Kui Cai, Xiaoxin Zou