Sciweavers

2740 search results - page 349 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
134
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
168
Voted
SC
2005
ACM
15 years 9 months ago
Intelligent Feature Extraction and Tracking for Visualizing Large-Scale 4D Flow Simulations
Terascale simulations produce data that is vast in spatial, temporal, and variable domains, creating a formidable challenge for subsequent analysis. Feature extraction as a data r...
Fan-Yin Tzeng, Kwan-Liu Ma
135
Voted
AIRWEB
2005
Springer
15 years 9 months ago
Blocking Blog Spam with Language Model Disagreement
We present an approach for detecting link spam common in blog comments by comparing the language models used in the blog post, the comment, and pages linked by the comments. In co...
Gilad Mishne, David Carmel, Ronny Lempel
131
Voted
CIKM
2005
Springer
15 years 9 months ago
Novelty detection based on sentence level patterns
The detection of new information in a document stream is an important component of many potential applications. In this paper, a new novelty detection approach based on the identi...
Xiaoyan Li, W. Bruce Croft
112
Voted
KIVS
2005
Springer
15 years 9 months ago
An Integrated Simulator for Inter-Domain Scenarios
Abstract. The simulation of large-scale inter-domain networks is useful for various aspects of network planning and management. It is also a challenge due to its scalability proble...
Matthias Scheidegger, Florian Baumgartner, Torsten...