Sciweavers

CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 10 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu
CORR
2010
Springer
371views Education» more  CORR 2010»
13 years 10 months ago
Experimentation for Packet Loss on MSP430 and nRF24L01 Based Wireless Sensor Network
-------------------------------------------ABSTRACT---------------------------------------In this paper, a new design of wireless sensor network (WSN) node is discussed which is ba...
S. S. Sonavane, B. P. Patil, V. Kumar
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 10 months ago
Simulation of Computer Network Attacks
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
Carlos Sarraute, Fernando Miranda, José Ign...
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 10 months ago
Centrality Metric for Dynamic Networks
Centrality is an important notion in network analysis and is used to measure the degree to which network structure contributes to the importance of a node in a network. While many...
Kristina Lerman, Rumi Ghosh, Jeon Hyung Kang
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 10 months ago
Choosability in geometric hypergraphs
Given a hypergraph H = (V, E), a coloring of its vertices is said to be conflict-free if for every hyperedge S ∈ E there is at least one vertex in S whose color is distinct fro...
Panagiotis Cheilaris, Shakhar Smorodinsky
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 10 months ago
Feedback Capacity of the Gaussian Interference Channel to within 2 Bits
We characterize the capacity region to within 2 bits/s/Hz and the symmetric capacity to within 1 bit/s/Hz for the two-user Gaussian interference channel (IC) with feedback. We dev...
Changho Suh, David Tse
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 10 months ago
Distribution of Cognitive Load in Web Search
The search task and the system both affect the demand on cognitive resources during information search. In some situations, the demands may become too high for a person. This arti...
Jacek Gwizdka
CORR
2010
Springer
87views Education» more  CORR 2010»
13 years 10 months ago
Quantum money from knots
Quantum money is a cryptographic protocol in which a mint can produce a quantum state, no one else can copy the state, and anyone (with a quantum computer) can verify that the sta...
Edward Farhi, David Gosset, Avinatan Hassidim, And...
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 10 months ago
Quantum interactive proofs with short messages
This paper considers three variants of quantum interactive proof systems in which short (meaning logarithmic-length) messages are exchanged between the prover and verifier. The ...
Salman Beigi, Peter W. Shor, John Watrous
CORR
2010
Springer
105views Education» more  CORR 2010»
13 years 10 months ago
Optimism in Reinforcement Learning Based on Kullback-Leibler Divergence
We consider model-based reinforcement learning in finite Markov Decision Processes (MDPs), focussing on so-called optimistic strategies. Optimism is usually implemented by carryin...
Sarah Filippi, Olivier Cappé, Aurelien Gari...