Sciweavers

2351 search results - page 383 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 4 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
ICDCS
2008
IEEE
15 years 4 months ago
Sensor Node Localization Using Uncontrolled Events
Many event-driven localization methods have been proposed as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately...
Ziguo Zhong, Dan Wang, Tian He
ICDM
2008
IEEE
106views Data Mining» more  ICDM 2008»
15 years 4 months ago
Metropolis Algorithms for Representative Subgraph Sampling
While data mining in chemoinformatics studied graph data with dozens of nodes, systems biology and the Internet are now generating graph data with thousands and millions of nodes....
Christian Hübler, Hans-Peter Kriegel, Karsten...
ICMCS
2008
IEEE
120views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Using Semantic Graphs for Image Search
In this paper, we propose a Semantic Graphs for Image Search (SGIS) system, which provides a novel way for image search by utilizing collaborative knowledge in Wikipedia and netwo...
Jyh-Ren Shieh, Yang-Ting Yeh, Chih-Hung Lin, Ching...
LCN
2008
IEEE
15 years 4 months ago
Optimal distance-based clustering for tag anti-collision in RFID systems
—Tag collisions can impose a major delay in Radio Frequency IDentification (RFID) systems. Such collisions are hard to overcome with passive tags due to their limited capabiliti...
Waleed Alsalih, Kashif Ali, Hossam S. Hassanein