• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,527
Next 10 →

The Cougar Approach to In-Network Query Processing in Sensor Networks

by Yong Yao, Johannes Gehrke - SIGMOD Record , 2002
"... The widespread distribution and availability of smallscale sensors, actuators, and embedded processors is transforming the physical world into a computing platform. One such example is a sensor network consisting of a large number of sensor nodes that combine physical sensing capabilities such as te ..."
Abstract - Cited by 498 (1 self) - Add to MetaCart
the data is aggregated and stored for offline querying and analysis. This approach has two major drawbacks. First, the user cannot change the behavior of the system on the fly. Second, conservation of battery power is a major design factor, but a central system cannot make use of in-network programming

RESEARCH ARTICLE Quantifying Discrepancies in Opinion Spectra from Online and Offline Networks

by Deokjae Lee, Kyu S. Hahn, Soon-hyung Yook, Juyong Park
"... Online social media such as Twitter are widely used for mining public opinions and senti-ments on various issues and topics. The sheer volume of the data generated and the eager adoption by the online-savvy public are helping to raise the profile of online media as a con-venient source of news and p ..."
Abstract - Add to MetaCart
and public opinions on social and political issues as well. Due to the uncontrollable biases in the population who heavily use the media, however, it is often diffi-cult to measure how accurately the online sphere reflects the offline world at large, under-mining the usefulness of online media. One way

Structure and evolution of online social networks

by Ravi Kumar, Jasmine Novak, Andrew Tomkins - In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , 2006
"... In this paper, we consider the evolution of structure within large online social networks. We present a series of measurements of two such networks, together comprising in excess of five million people and ten million friendship links, annotated with metadata capturing the time of every event in the ..."
Abstract - Cited by 400 (4 self) - Add to MetaCart
even in the absence of stars. We present a simple model of network growth which captures these aspects of component structure. The model follows our ex-perimental results, characterizing users as either passive members of the network; inviters who encourage offline friends and acquain-tances to migrate

Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks

by Steven M. Bellovin, Michael Merritt - IEEE SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY , 1992
"... Classical cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. We introduce a novel combination of asymmetric (public-key) and symmetric (secret-key) cryptography that allow two parties sharing a common password to exchange confidential and authenti ..."
Abstract - Cited by 436 (5 self) - Add to MetaCart
and authenticated information over an insecure network. These protocols are secure against active attacks, and have the property that the password is protected against off-line "dictionary" attacks. There are a number of other useful applications as well, including secure public telephones.

Generalization in Reinforcement Learning: Successful Examples Using Sparse Coarse Coding

by Richard S. Sutton - Advances in Neural Information Processing Systems 8 , 1996
"... On large problems, reinforcement learning systems must use parameterized function approximators such as neural networks in order to generalize between similar situations and actions. In these cases there are no strong theoretical results on the accuracy of convergence, and computational results have ..."
Abstract - Cited by 433 (20 self) - Add to MetaCart
On large problems, reinforcement learning systems must use parameterized function approximators such as neural networks in order to generalize between similar situations and actions. In these cases there are no strong theoretical results on the accuracy of convergence, and computational results

Adapting Golog for composition of semantic web Services

by Sheila Mcilraith , 2002
"... Motivated by the problem of automatically composing network accessible services, such as those on the World Wide Web, this paper proposes an approach to building agent technology based on the notion of generic procedures and customizing user constraint. We argue that an augmented version of the logi ..."
Abstract - Cited by 381 (17 self) - Add to MetaCart
Motivated by the problem of automatically composing network accessible services, such as those on the World Wide Web, this paper proposes an approach to building agent technology based on the notion of generic procedures and customizing user constraint. We argue that an augmented version

F.: Offline Network Intrusion Detection: Mining TCPDUMP Data to Identify Suspicious Activity

by Kristin R. Nauta, Frank Lieble - Proceedings of the AFCEA Federal Database Colloquium , 1999
"... With the boom in electronic commerce and the increasing global interconnectedness of computer systems, infrastructure protection has quickly become the ’next big problem ’ after Year 2000 preparedness. Public and private sector organizations have a created a multi-billion dollar market demand for to ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
for tools to protect themselves against cyber attacks. System administrators are scrambling to find in-line and off-line solutions for detecting network vulnerabilities, and to understand the behavior of network resource consumers. This paper will provide an introduction to the intricacies of reconciling

The 1999 DARPA off-line intrusion detection evaluation

by Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das - Computer Networks , 2000
"... Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government site containing hundreds of users on thousands of hosts. More than 200 instances of 58 attack types were launched again ..."
Abstract - Cited by 205 (9 self) - Add to MetaCart
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government site containing hundreds of users on thousands of hosts. More than 200 instances of 58 attack types were launched

RSS Offline

by Walisa Romsaiyud
"... Abstract: Most people are interested in many websites whose content changes on an unpredictable schedule. Examples of such websites are news sites, community and religious organization information pages. The user would repeatedly checking each website to see if there is any new content, many web sit ..."
Abstract - Add to MetaCart
sites/pages are provide what are called RSS feeds, which are descriptions of the new data is a lightweight XML format but they are not able to retrieve information that was updated during the time period when the reader is offline. In this paper, I proposal an algorithm to support retrieving, archiving

Offline planning with . . .

by John-paul Kelly, Adi Botea, Sven Koenig , 2008
"... Artificial intelligence (AI) technology can have a dramatic impact on the quality of video games. AI planning techniques are useful in a wide range of game components, including modules that control the behavior of fully autonomous units. However, planning is computationally expensive, and the CPU a ..."
Abstract - Add to MetaCart
and memory resources available to game AI modules at runtime are scarce. Offline planning can be a good strategy to avoid runtime performance bottlenecks. In this work, we apply hierarchical task network (HTN) planning to video games. We describe a system that computes plans offline and then represents them
Next 10 →
Results 1 - 10 of 2,527
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University