Academic literature on the topic 'Spurios message'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Spurios message.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Spurios message"

1

Somu, Parande, and D. Mallapur Jayashree. "Tactical approach to identify and quarantine spurious node participation request in sensory application." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (2020): 3451–59. https://doi.org/10.11591/ijece.v10i4.pp3451-3459.

Full text
Abstract:
Securing Wireless Sensor Network (WSN) from variable forms of adversary is still an open end challenge. Review of diversified security apprroaches towards such problems that they are highly symptomatic with respect to resiliency strength against attack. Therefore, the proposed system highlights a novel and effective solution that is capable of identify the spurios request for participating in teh network building process from attacker and in return could deviate the route of attacker to some virtual nodes and links. A simple trust based mechanism is constructed for validating the legitimacy of
APA, Harvard, Vancouver, ISO, and other styles
2

Karaata, Mehmet Hakan, Ali Hamdan, Maha H. Faisal, and Feda A. AlShawan. "Fault Detection for Message Passing Systems." Journal of Circuits, Systems and Computers 27, no. 05 (2018): 1850070. http://dx.doi.org/10.1142/s0218126618500706.

Full text
Abstract:
Many crucial dependable and secure services including atomic commitment, consensus and group membership, and middleware services (such as replica, communication and transaction services) use fault detectors. Through the use of fault detectors, the overlying service can be exempted from failure treatment and synchronization requirements. Fault detection is essential for proving that the services carried out are correct. In this paper, we first identify the necessary conditions to detect faults in a message passing system where multiple disjoint paths exist between each pair of endpoints. We the
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Sungwon, Yeongjoon Bae, Muhammad Toaha Raza Khan, Junho Seo, and Dongkyun Kim. "Avoiding Spurious Retransmission over Flooding-Based Routing Protocol for Underwater Sensor Networks." Wireless Communications and Mobile Computing 2020 (August 25, 2020): 1–9. http://dx.doi.org/10.1155/2020/8839541.

Full text
Abstract:
In underwater wireless sensor networks (UWSN), acoustic communication naturally introduces challenges such as long propagation delay and high packet loss. The flooding-based routing protocol can address these challenges with its multipath characteristics. As in flooding-based routing, due to multipath propagation mechanism, not only DATA but also ACK messages are transmitted through multiple routes however still some packet loss will degrade the performance. So, to provide high reliability of message delivery, an efficient retransmission mechanism is inevitable. Though, if the network uses con
APA, Harvard, Vancouver, ISO, and other styles
4

Baiocchi, Andrea, Pierpaolo Salvo, Francesca Cuomo, and Izhak Rubin. "Understanding Spurious Message Forwarding in VANET Beaconless Dissemination Protocols: An Analytical Approach." IEEE Transactions on Vehicular Technology 65, no. 4 (2016): 2243–58. http://dx.doi.org/10.1109/tvt.2015.2422753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ramsey, N. "Eliminating Spurious Error Messages Using Exceptions, Polymorphism, and Higher-Order Functions." Computer Journal 42, no. 5 (1999): 360–72. http://dx.doi.org/10.1093/comjnl/42.5.360.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hoffman, Ralph E., Scott W. Woods, Keith A. Hawkins, et al. "Extracting spurious messages from noise and risk of schizophrenia-spectrum disorders in a prodromal population." British Journal of Psychiatry 191, no. 4 (2007): 355–56. http://dx.doi.org/10.1192/bjp.bp.106.031195.

Full text
Abstract:
SummaryA tendency to extract spurious, message-like meaning from meaningless noise was assessed as a risk factor leading to shizophrenia-spectrum disorders by assessing word length of speech illusions elicited by multispeaker babble in 43 people with prodromal symptoms. These individuals were randomised to olanzapine v. placebo groups during year 1 followed by no pharmacological treatment for those with no disorder conversion during year 2. A time-dependent Cox regression analysis of conversion to schizophrenia-spectrum disorder revealed a significant interaction between condition (olanzapine
APA, Harvard, Vancouver, ISO, and other styles
7

Lodge, Milton, Marco R. Steenbergen, and Shawn Brau. "The Responsive Voter: Campaign Information and the Dynamics of Candidate Evaluation." American Political Science Review 89, no. 2 (1995): 309–26. http://dx.doi.org/10.2307/2082427.

Full text
Abstract:
We find strong support for an on-line model of the candidate evaluation process that in contrast to memory-based models shows that citizens are responsive to campaign information, adjusting their overall evaluation of the candidates in response to their immediate assessment of campaign messages and events. Over time people forget most of the campaign information they are exposed to but are nonetheless able to later recollect their summary affective evaluation of candidates which they then use to inform their preferences and vote choice. These findings have substantive, methodological, and norm
APA, Harvard, Vancouver, ISO, and other styles
8

Putri, Dinda Rachma, Diandra Forceila, and Lystia Ivana. "Persepsi Pada Jingle Shopee Versi Baby Shark (Studi Deskriptif Followers Instagram @Shopee_id)." Inter Komunika: Jurnal Komunikasi 6, no. 1 (2021): 1. http://dx.doi.org/10.33376/ik.v6i1.641.

Full text
Abstract:
The more and more trade and service companies causes ever-tougher promotion competition. Therefore, advertising in media becomes indispensable needed. The increased competition in trade spurs the emergence of commercial messages in the form of advertisements. One of the well-known e-commerce companies, Shopee, uses the famous Baby Shark song to be used as the company's jingle ad. Jingle is one of the audio stimuli used in advertising as a support for media activation of a product. The Baby Shark version of Shopee ads must have made a message that will be stored in the minds of the people, but
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Jialu, Ruzica Piskac, Ennan Zhai, and Tianyin Xu. "Static detection of silent misconfigurations with deep interaction analysis." Proceedings of the ACM on Programming Languages 5, OOPSLA (2021): 1–30. http://dx.doi.org/10.1145/3485517.

Full text
Abstract:
The behavior of large systems is guided by their configurations: users set parameters in the configuration file to dictate which corresponding part of the system code is executed. However, it is often the case that, although some parameters are set in the configuration file, they do not influence the system runtime behavior, thus failing to meet the user’s intent. Moreover, such misconfigurations rarely lead to an error message or raising an exception. We introduce the notion of silent misconfigurations which are prohibitively hard to identify due to (1) lack of feedback and (2) complex intera
APA, Harvard, Vancouver, ISO, and other styles
10

Szilágyi, András, István Zachar, Anna Fedor, Harold P. de Vladar, and Eörs Szathmáry. "Breeding novel solutions in the brain: a model of Darwinian neurodynamics." F1000Research 5 (September 28, 2016): 2416. http://dx.doi.org/10.12688/f1000research.9630.1.

Full text
Abstract:
Background: The fact that surplus connections and neurons are pruned during development is well established. We complement this selectionist picture by a proof-of-principle model of evolutionary search in the brain, that accounts for new variations in theory space. We present a model for Darwinian evolutionary search for candidate solutions in the brain. Methods: We combine known components of the brain – recurrent neural networks (acting as attractors), the action selection loop and implicit working memory – to provide the appropriate Darwinian architecture. We employ a population of attracto
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Spurios message"

1

Falk, Avner. Anti-Semitism. Greenwood Publishing Group, Inc., 2008. http://dx.doi.org/10.5040/9798400613470.

Full text
Abstract:
In the summer of 2006, the author received a message that read, Love the Nazis, and KILL THE JEWS DEAD. And that was the trigger that launched internationally known scholar Falk into work on this book. Anti-Semitism has once again become a worldwide phenomenon, growing largely during the last decade of the 20th century and the early years of the 21st. Among the spurs for this are the migration of Muslim populations and the ongoing Israeli-Arab wars. In this far-reaching and comprehensive volume, Falk delves deeply into the current events, history, and literature on anti-Semitism, integrating i
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Spurios message"

1

Hughes, David A. "Fear and Threat." In “Covid-19,” Psychological Operations, and the War for Technocracy. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-41850-1_4.

Full text
Abstract:
AbstractWestern governments have long used manufactured fear as a means of keeping the population susceptible to propaganda. A “pandemic” is a powerful fear concept; yet, there is no credible evidence of a viral pandemic in 2020. “Covid-19” does not meet any credible (pre-2009) definition of a “pandemic,” and attempts to present “Covid-19” as a new “Spanish flu” are bogus. The exaggerated threat of “Covid-19” was a function of military-grade propaganda, emanating from governments and the media, involving a barrage of terrifying images, messages, and “alert levels.” The BBC played a particularl
APA, Harvard, Vancouver, ISO, and other styles
2

Chajdas, Tymoteusz. "Misleading Media Portrayals in a Globalized World." In Advances in Media, Entertainment, and the Arts. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8535-0.ch004.

Full text
Abstract:
This chapter discusses the phenomenon of media power and dissemination of misleading and spurious representations. The author argues that global mass media can increasingly be seen as devices of control. This is inferred from a frequent use of Orientalist discourses when portraying the Middle East, which bestows the media messages with hidden power structures. These messages, along with the emergence of social media and a high saturation of visual media, contribute to strengthening of media power. This enables the state to justify its control and political actions. By drawing on Orientalism an
APA, Harvard, Vancouver, ISO, and other styles
3

Allchin, Douglas. "Science beyond Scientists." In Sacred Bovines. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190490362.003.0020.

Full text
Abstract:
A message of alarm arrives from your cousins: What do you know about the science of “fracking”? Fracking is a way to extract oil and gas. It could potentially generate lots of welcome income in their impoverished rural community—while supplying energy domestically. But possibly dangerous chemicals are injected into the earth and collect in waste ponds. Some residents are worrying about contaminated groundwater. It’s potentially quite frightening. But also confusing. Your cousins seek your perspective. Such a scenario seems to epitomize what “scientific literacy” is all about: being able to int
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Spurios message"

1

Jiang, Xuan, Zhiyong Yang, Peisong Wen, Li Su, and Qingming Huang. "A Sparse-Motif Ensemble Graph Convolutional Network against Over-smoothing." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/291.

Full text
Abstract:
The over-smoothing issue is a well-known challenge for Graph Convolutional Networks (GCN). Specifically, it is often observed that increasing the depth of GCN ends up in a trivial embedding subspace where the difference among node embeddings belonging to the same cluster tends to vanish. This paper believes that the main cause lies in the limited diversity along the message passing pipeline. Inspired by this, we propose a Sparse-Motif Ensemble Graph Convolutional Network (SMEGCN). We argue that merely employing the original graph Laplacian as the spectrum of the graph cannot capture the divers
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Jiyu, Liusheng Huang, Hongli Xu, Mingjun Xiao, and Weijie Guo. "An Incremental BP Neural Network Based Spurious Message Filter for VANET." In 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2012. http://dx.doi.org/10.1109/cyberc.2012.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rama Rao, Mekala, Pratap Reddy L, Narayana Murthy BHVS, and Maruti Sairam Annaluru. "Cryptographic Strength Estimation Using Spurious Keys with Consideration to Information Content in the Message." In 7th International Conference on Computer Science, Engineering & Applications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!