Detection of functional state after alcohol consumption by classification and machine learning technics
M Evin, J Taillard, HL De la Fuente… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
Machine learning (ML) technics have been recently used to detect emotion and predict
crash severity. This research work aims at assessing different classifications and machine …
crash severity. This research work aims at assessing different classifications and machine …
Efficient chaff-aided obfuscation in resource constrained environments
EN Ciftcioglu, RL Hardy, LM Scott… - MILCOM 2017-2017 …, 2017 - ieeexplore.ieee.org
This work considers the use of obfuscation against a global eavesdropper in a resource-
constrained environment. We assume a network where network traffic (queries) is not …
constrained environment. We assume a network where network traffic (queries) is not …
Maximizing coverage centrality via network design: Extended version
Network centrality plays an important role in many applications. Central nodes in social
networks can be influential, driving opinions and spreading news or rumors. In hyperlinked …
networks can be influential, driving opinions and spreading news or rumors. In hyperlinked …
[图书][B] Scalable Algorithms for Network Design
S Medya - 2019 - search.proquest.com
Networks (or graphs) are a powerful tool to model complex systems such as social networks,
transportation networks, and the Web. Network design problems, including planning …
transportation networks, and the Web. Network design problems, including planning …
Decentralized network protection games in adversarial environments
We study network protection in a decentralized setting, where nodes can protect edges (or
links) incident on it against an intelligent adversary capable of attacking edges. If an edge …
links) incident on it against an intelligent adversary capable of attacking edges. If an edge …
[PDF][PDF] Topology control of Command and Control networks
Command and Control (C2) agility, as stated from the NATO SAS-085 asserts that there is
no best approach to C2. We envision situations where adversarial entities are working to …
no best approach to C2. We envision situations where adversarial entities are working to …