Sciweavers

7168 search results - page 224 / 1434
» A Factorization Approach to Grouping
Sort
View
CASES
2010
ACM
15 years 2 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
BMEI
2009
IEEE
15 years 2 months ago
The Finitely Geometric Symptom Analysis in the Glioma Survival Study
Novel approach for statistical inference in survival analysis based on factor or dichotomic variables is proposed. We are seeking for the most informative finitely linear combinat...
Nina Alexeyeva, Ivan Smirnov, Polina Gracheva, Bor...
115
Voted
CORR
2006
Springer
112views Education» more  CORR 2006»
15 years 4 months ago
Algorithms and Approaches of Proxy Signature: A Survey
Numerous research studies have been investigated on proxy signatures over the last decade. This survey reviews the research progress on proxy signatures, analyzes a few notable pr...
Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak
GROUP
2005
ACM
15 years 10 months ago
A survey of personal and household scheduling
We describe results from a survey of employees at Microsoft about how they manage personal and household scheduling. We saw a much greater use of digital calendars than we expecte...
A. J. Bernheim Brush, Tammara Combs Turner
GROUP
2005
ACM
15 years 10 months ago
Real-world oriented information sharing using social networks
While users disseminate various information in the open and widely distributed environment of the Semantic Web, determination of who shares access to particular information is at ...
Junichiro Mori, Tatsuhiko Sugiyama, Yutaka Matsuo