Sciweavers

EDBT
2016
ACM
53views Database» more  EDBT 2016»
8 years 7 months ago
A Two Phase Deep Learning Model for Identifying Discrimination from Tweets
Discrimination discovery is the data mining problem of unveiling discriminatory practices by analyzing a dataset of historical decision records. In this paper, we focus on discove...
ADHOC
2016
87views Database» more  ADHOC 2016»
8 years 8 months ago
Integration of scheduling and network coding in multi-rate wireless mesh networks: Optimization models and algorithms
Y-networks: An abstraction of collection tree in sensor networks. ACM Transactions on Sensor Networks, 11(4), 1-24. <a href="http://dx.doi.org/10.1145/2764459">[Mor...
Zhaolong Ning, Qingyang Song, Lei Guo 0005, Zhikui...
ADHOC
2016
53views Database» more  ADHOC 2016»
8 years 8 months ago
Establishing location-privacy in decentralized long-distance geocast services
—The ability to communicate over long distances is of central importance for smart traffic applications like cooperative route planning or the discovery and reservation of charg...
Martin Florian, Felix Pieper, Ingmar Baumgart
ADHOC
2016
62views Database» more  ADHOC 2016»
8 years 8 months ago
On the displacement for covering a d-dimensional cube with randomly placed sensors
Consider n sensors placed randomly and independently with the uniform distribution in a d−dimensional unit cube (d ≥ 2). The sensors have identical sensing range equal to r, f...
Rafal Kapelko, Evangelos Kranakis
ADHOC
2016
48views Database» more  ADHOC 2016»
8 years 8 months ago
Decentralized robust spectrum allocation for cognitive radio wireless mesh networks
During the last decade we have seen an explosive growth in the deployment of wireless networks in unlicensed frequency bands, mainly driven by the great success of the IEEE 802.11...
Germán Capdehourat, Federico Larroca, Pablo...
ADHOC
2016
51views Database» more  ADHOC 2016»
8 years 8 months ago
Opportunistic communications based on distributed width-controllable braided multipath routing in wireless sensor networks
Multipath routing, especially braided multipath routing (BMR), has become a powerful tool to provide reliable and energy-efficient packet transmissions against wireless links loss...
Xinjiang Sun, Hao Chen, Xiaobei Wu, Xinjie Yin, We...
ADHOC
2016
55views Database» more  ADHOC 2016»
8 years 8 months ago
Security of electrostatic field persistent routing: Attacks and defense mechanisms
—Electrostatic Field-based Routing (EFR) is a form of geographical multi-path routing where packets are routed along a collection of electrostatic field lines, defined by elect...
Oliviu C. Ghica, Cristina Nita-Rotaru, Goce Trajce...
ADHOC
2016
60views Database» more  ADHOC 2016»
8 years 8 months ago
Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags
RFID, which stands for Radio Frequency Identification, is a relatively new technology often envisioned as an enabler of the Internet of Things. The widespread use of this technol...
Tassos Dimitriou
ADCM
2016
70views Database» more  ADCM 2016»
8 years 8 months ago
Rank-1 lattice rules for multivariate integration in spaces of permutation-invariant functions - Error bounds and tractability
We study multivariate integration of functions that are invariant under permutations (of subsets) of their arguments. We find an upper bound for the nth minimal worst case error ...
Dirk Nuyens, Gowri Suryanarayana, Markus Weimar