Sciweavers

405 search results - page 80 / 81
» Avatar-centric Risk Evaluation
Sort
View
PVLDB
2010
118views more  PVLDB 2010»
13 years 4 months ago
Ten Thousand SQLs: Parallel Keyword Queries Computing
Keyword search in relational databases has been extensively studied. Given a relational database, a keyword query finds a set of interconnected tuple structures connected by fore...
Lu Qin, Jefferey Yu, Lijun Chang
TMI
2010
122views more  TMI 2010»
13 years 4 months ago
Feature Based Nonrigid Brain MR Image Registration With Symmetric Alpha Stable Filters
—A new feature based nonrigid image registration method for magnetic resonance (MR) brain images is presented in this paper. Each image voxel is represented by a rotation invaria...
Shu Liao, Albert C. S. Chung
TSC
2010
200views more  TSC 2010»
13 years 4 months ago
TQoS: Transactional and QoS-Aware Selection Algorithm for Automatic Web Service Composition
—Web Services are the most famous implementation of service oriented architectures that has brought some challenging research issues. One of these is the composition, i.e. the ca...
Joyce El Haddad, Maude Manouvrier, Marta Rukoz
USS
2010
13 years 3 months ago
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...
INFOCOM
2011
IEEE
12 years 9 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz