Sciweavers

728 search results - page 78 / 146
» ideas 2009
Sort
View
ICDM
2009
IEEE
155views Data Mining» more  ICDM 2009»
14 years 3 months ago
Stacked Gaussian Process Learning
—Triggered by a market relevant application that involves making joint predictions of pedestrian and public transit flows in urban areas, we address the question of how to utili...
Marion Neumann, Kristian Kersting, Zhao Xu, Daniel...
ICNP
2009
IEEE
14 years 3 months ago
Accurate Clock Synchronization for IEEE 802.11-Based Multi-Hop Wireless Networks
—Clock synchronization is an essential building block for many control mechanisms used in wireless networks, including frequency hopping, power management, and packet scheduling....
Jui-Hao Chiang, Tzi-cker Chiueh
ICNS
2009
IEEE
14 years 3 months ago
Impact of Obstacles on the Degree of Mobile Ad Hoc Connection Graphs
What is the impact of obstacles on the graphs of connections between stations in Mobile Ad hoc Networks? In order to answer, at least partially, this question, the first step is ...
Cédric Gaël Aboue-Nze, Fréd&eac...
ICNS
2009
IEEE
14 years 3 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
ICPPW
2009
IEEE
14 years 3 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta