Sciweavers

SAC
2010
ACM
13 years 11 months ago
A rough set approach to mining connections from information systems
Å Ò Ò Ø Ò × Ò ÓÒÒ Ø ÓÒ× ÖÓÑ Ò ÓÖÑ Ø ÓÒ ×Ý×¹ Ø Ñ× ´ÓÖ Ø × ×µ × Ñ ÙÐØ Ý Ø Ö ÒØ Ø Ú ÓÖ× Ò Ö Ð Ø ÓÒ× Ô× ÖÓ××ÑÙÐØ ...
Ken Kaneiwa
SAC
2010
ACM
13 years 11 months ago
Analysis of collision probability in unsaturated situation
A large number of the MAC protocols proposed for establishing wireless sensor networks are based on the 802.11 standard. The trade-off in these protocols is the control packet ov...
Qian Dong, Waltenegus Dargie
SAC
2010
ACM
13 years 11 months ago
Modeling cardinal directions in the 3D space with the objects interaction cube matrix
In GIS and spatial databases, cardinal directions are frequently used as selection and join criteria in query languages. However, most cardinal direction models are only able to h...
Tao Chen, Markus Schneider
SAC
2010
ACM
13 years 11 months ago
e-mail authorship verification for forensic investigation
Farkhund Iqbal, Liaquat A. Khan, Benjamin C. M. Fu...
SAC
2010
ACM
13 years 11 months ago
Embedded contract languages
Manuel Fähndrich, Michael Barnett, Francesco ...
SAC
2010
ACM
13 years 11 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
SAC
2010
ACM
13 years 11 months ago
Seal object detection in document images using GHT of local component shapes
Due to noise, overlapped text/signature and multi-oriented nature, seal (stamp) object detection involves a difficult challenge. This paper deals with automatic detection of seal ...
Partha Pratim Roy, Umapada Pal, Josep Lladó...
SAC
2010
ACM
13 years 11 months ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...
SAC
2010
ACM
13 years 11 months ago
Design pattern implementation in object teams
Implementing the 23 Gang-of-Four design patterns in the aspectoriented programming language Object Teams/Java (OT/J) yields modularity and reusability results roughly comparable t...
João L. Gomes, Miguel P. Monteiro
SAC
2010
ACM
13 years 11 months ago
A wavelet-based sampling algorithm for wireless sensor networks applications
This work proposes and evaluates a sampling algorithm based on wavelet transforms with Coiflets basis to reduce the data sensed in wireless sensor networks applications. The Coi...
André L. L. de Aquino, Ricardo A. R. Olivei...