Search
Now showing items 31-40 of 287
On Feasibility Of Fingerprinting Wireless Sensor Nodes Using Physical Properties
(Computer Science & Engineering, 2012-07-25)
Fingerprinting wireless devices using physical properties has been recently suggested as an alternative for device identification and authentication. It has been found that the clock skew caused by the frequency discrepancy ...
A Source Code Search Engine For Keyword Based Structural Relationship Search
(Computer Science & Engineering, 2013-07-22)
In an Object Oriented Program, we often see that a package contains several classes, a class contains several methods, a method calls other methods. We may say, there is a contains relationship between a package and a class ...
Measurements Of A Latency-biased Expander Topology In The Tor Anonymity System
(Computer Science & Engineering, 2013-03-20)
Anonymous communication systems protect the privacy of their users by hiding who is communicating with whom. With the widespread use of the Internet, anonymity systems are all the more essential to support applications ...
Quantitative Analysis Of Surface Enhanced Raman Spectra
(Computer Science & Engineering, 2013-10-22)
Quantitative analysis of Raman spectra using surface-enhanced Raman scattering (SERS) nanoparticles has shown the potential and promising trend of development in vivo molecular imaging. One of the key job is from the ...
Learning Partially Observable Markov Decision Processes Using Abstract Actions
(Computer Science & Engineering, 2014-03-10)
Transfer learning and Abstraction are among the new and most interesting research topics in AI and address the use of learned knowledge to improve learning performance in subsequent tasks. While there has been significant ...
A New Integrative Data Mining Framework For Analyzing The Cancer Genome Atlas Data
(Computer Science & Engineering, 2014-03-10)
Besides accuracy and efficiency, understandability is another key issue of predictive modeling in real-world applications, especially in biomedical and healthcare data analysis. We develop a new integrative framework to ...
Development And Simulation Of Focus Of Attention Using Reinforcement Learning And Function Approximation
(Computer Science & Engineering, 2013-10-22)
Without short-term memory, people would have little hope to learn and accomplish tasks. The same can be said for artificially intelligent agents. Often referred as Miller's Law, the number of working objects that a human ...
Shaping And Maintenance Of Low-latency Anonymity Systems
(Computer Science & Engineering, 2013-03-20)
Surveillance of users on the Internet is growing. This makes it increasingly important to protect users' identity when they communicate online, especially for users like journalists, whistleblowers, and military officials. ...
Implementation Of A Middleware Architecture For Collaboration Among Mobile Devices In Opportunistic Networks.
(Computer Science & Engineering, 2013-03-20)
Opportunistic networks provide a viable platform for mobile communications due to the ubiquity of smart phones. These networks are characterized by lack of end to-end reliable connections. In such networks, establishing ...
Improving Quality Of Service In XML Data Stream Processing Using Load Shedding
(Computer Science & Engineering, 2012-07-25)
In recent years, we have witnessed the emergence of new types of systems that deal with large volumes of streaming data. Examples include nancial data analy- sis on feeds of stock tickers, sensor-based environmental ...