Data Science
暂无分享,去创建一个
[1] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[2] Samyam Rajbhandari,et al. LONG SHORT-TERM MEMORY , 2018 .
[3] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[4] Zulaiha Ali Othman,et al. Opinion Mining and Sentiment Analysis: A Survey , 2012, BIOINFORMATICS 2012.
[5] Jiming Chen,et al. Optimal Scheduling for Quality of Monitoring in Wireless Rechargeable Sensor Networks , 2013, IEEE Transactions on Wireless Communications.
[6] Bing Liu,et al. Sentiment Analysis and Opinion Mining , 2012, Synthesis Lectures on Human Language Technologies.
[7] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[8] Shaojie Tang,et al. Near Optimal Charging and Scheduling Scheme for Stochastic Event Capture with Rechargeable Sensors , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.
[9] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[10] Yoram Singer,et al. Adaptive Subgradient Methods for Online Learning and Stochastic Optimization , 2011, J. Mach. Learn. Res..
[11] N. Rengarajan,et al. An Intelligent Technique to Detect Jamming Attack in Wireless Sensor Networks (WSNs) , 2015, Int. J. Fuzzy Syst..
[12] Oren Etzioni,et al. Extracting Product Features and Opinions from Reviews , 2005, HLT.
[13] Wanxiang Che,et al. LTP: A Chinese Language Technology Platform , 2010, COLING.
[14] M. Kayton,et al. Global positioning system: signals, measurements, and performance [Book Review] , 2002, IEEE Aerospace and Electronic Systems Magazine.
[15] Lisa Ann Osadciw,et al. Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.
[16] Richard P. Martin,et al. The limits of localization using signal strength: a comparative study , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[17] Wenyuan Xu,et al. Anti-jamming timing channels for wireless networks , 2008, WiSec '08.
[18] Xiaodong Wang,et al. Jammer Localization in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[19] Jalel Ben-Othman,et al. DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks , 2015, Perform. Evaluation.
[20] Christian Bonnet,et al. Mobility models for vehicular ad hoc networks: a survey and taxonomy , 2009, IEEE Communications Surveys & Tutorials.
[21] Eylem Ekici,et al. A Localization-Based Anti-Sensor Network System , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[22] Jens B. Schmitt,et al. Detection of reactive jamming in DSSS-based wireless networks , 2013, WiSec '13.
[23] Satish Vadlamani,et al. Jamming attacks on wireless networks: A taxonomic survey , 2016 .
[24] Yu He,et al. Chinese Explanatory Segment Recognition as Sequence Labeling , 2015, ICYCSEE.
[25] Jason Weston,et al. Natural Language Processing (Almost) from Scratch , 2011, J. Mach. Learn. Res..
[26] Qiang Liu,et al. A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology , 2013, CSS.
[27] Wenyuan Xu,et al. Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[28] Claire Cardie,et al. Annotating Expressions of Opinions and Emotions in Language , 2005, Lang. Resour. Evaluation.
[29] Wenyuan Xu,et al. Localizing jammers in wireless networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[30] Ranjit Singh,et al. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.
[31] Andrew McCallum,et al. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data , 2001, ICML.
[32] James Kennedy,et al. The particle swarm: social adaptation of knowledge , 1997, Proceedings of 1997 IEEE International Conference on Evolutionary Computation (ICEC '97).
[33] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[34] F. Golatowski,et al. Weighted Centroid Localization in Zigbee-based Sensor Networks , 2007, 2007 IEEE International Symposium on Intelligent Signal Processing.
[35] Tharek Abd Rahman,et al. A survey and open issues of jammer localization techniques in wireless sensor networks , 2015 .
[36] Yuji Matsumoto,et al. Extracting Aspect-Evaluation and Aspect-Of Relations in Opinion Mining , 2007, EMNLP.
[37] Kartik Siddhabathula,et al. Fast jamming detection in Wireless Sensor Networks , 2010 .
[38] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[39] Srikanth V. Krishnamurthy,et al. Jammer localization in wireless networks: An experimentation-driven approach , 2016, Comput. Commun..
[40] Jürgen Schmidhuber,et al. Framewise phoneme classification with bidirectional LSTM and other neural network architectures , 2005, Neural Networks.
[41] Deborah Estrin,et al. GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..