Sciweavers

138 search results - page 4 / 28
» Finding Key Bloggers, One Post At A Time
Sort
View
JDCTA
2008
88views more  JDCTA 2008»
13 years 5 months ago
A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
In WSNs, since the attacks, such as jamming or eavesdropping without physical access, easily occur, security is one of the important requirements for WSNs. The key pre-distributio...
Yoon-Su Jeong, Yong-Tae Kim, Gil-Cheol Park, Sang ...
SEFM
2003
IEEE
13 years 11 months ago
From Requirements to Design: Formalizing the Key Steps
Despite the advances in software engineering since 1968, current methods for going from a set of functional requirements to a design are not as direct, repeatable and constructive...
R. Geoff Dromey
COLT
2003
Springer
13 years 11 months ago
On Finding Large Conjunctive Clusters
We propose a new formulation of the clustering problem that differs from previous work in several aspects. First, the goal is to explicitly output a collection of simple and meani...
Nina Mishra, Dana Ron, Ram Swaminathan
ICA3PP
2009
Springer
13 years 9 months ago
Finding Object Depth Using Stereoscopic Photography
Stereoscopic scenes of the mankind is naturally caused by synthesizing two images produced by the parallax of the two eyes of human. Such being the case, mankind can distinguish t...
Yu-Hua Lee, Tai-Pao Chuang
JCB
2007
108views more  JCB 2007»
13 years 5 months ago
A Dynamic Programming Approach for Finding Common Patterns in RNAs
We developed a dynamic programming approach of computing common sequence structure patterns among two RNAs given their primary sequences and their secondary structures. Common pat...
Sven Siebert, Rolf Backofen