Sciweavers

394 search results - page 78 / 79
» The Hidden Order of Wikipedia
Sort
View
IOR
2010
169views more  IOR 2010»
13 years 4 months ago
Dynamic Supplier Contracts Under Asymmetric Inventory Information
In this paper, we examine a supply chain in which a single supplier sells to a downstream retailer. We consider a multi-period model, with the following sequence of events. In per...
Hao Zhang, Mahesh Nagarajan, Greys Sosic
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 4 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
TMC
2010
130views more  TMC 2010»
13 years 4 months ago
SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes
—This paper presents SYNAPSE++, a system for over the air reprogramming of wireless sensor networks (WSNs). In contrast to previous solutions, which implement plain negative ackn...
Michele Rossi, Nicola Bui, Giovanni Zanca, Luca St...
ICDIM
2010
IEEE
13 years 4 months ago
Data mining and automatic OLAP schema generation
Data mining aims at extraction of previously unidentified information from large databases. It can be viewed as an automated application of algorithms to discover hidden patterns a...
Muhammad Usman, Sohail Asghar, Simon Fong
ICMI
2010
Springer
172views Biometrics» more  ICMI 2010»
13 years 3 months ago
Modelling and analyzing multimodal dyadic interactions using social networks
Social network analysis became a common technique used to model and quantify the properties of social interactions. In this paper, we propose an integrated framework to explore th...
Sergio Escalera, Petia Radeva, Jordi Vitrià...