Sciweavers

21 search results - page 3 / 5
» jcst 2008
Sort
View
JCST
2008
98views more  JCST 2008»
13 years 4 months ago
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on ...
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert,...
JCST
2008
102views more  JCST 2008»
13 years 4 months ago
Random and Periodic Sleep Schedules for Target Detection in Sensor Networks
Abstract--We study Random and Periodic sleep schedules from the point of view of delay in detecting the target. We consider sleep schedules in which a sensor in `inactive' mod...
Vaishali P. Sadaphal, Bijendra N. Jain
JCST
2008
114views more  JCST 2008»
13 years 4 months ago
Synthesizing Service Composition Models on the Basis of Temporal Business Rules
Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a...
Jian Yu, Yanbo Han, Jun Han, Yan Jin, Paolo Falcar...
JCST
2008
138views more  JCST 2008»
13 years 4 months ago
Predicting Chinese Abbreviations from Definitions: An Empirical Learning Approach Using Support Vector Regression
In Chinese, phrases and named entities play a central role in information retrieval. Abbreviations, however, make keyword-based approaches less effective. This paper presents an em...
Xu Sun, Houfeng Wang, Bo Wang 0003
JCST
2008
124views more  JCST 2008»
13 years 4 months ago
Clustering by Pattern Similarity
The task of clustering is to identify classes of similar objects among a set of objects. The definition of similarity varies from one clustering model to another. However, in most ...
Haixun Wang, Jian Pei