Sciweavers

6506 search results - page 1192 / 1302
» Algorithmic models for sensor networks
Sort
View
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
15 years 4 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
WAW
2007
Springer
91views Algorithms» more  WAW 2007»
15 years 4 months ago
Determining Factors Behind the PageRank Log-Log Plot
Abstract. We study the relation between PageRank and other parameters of information networks such as in-degree, out-degree, and the fraction of dangling nodes. We model this relat...
Yana Volkovich, Nelly Litvak, Debora Donato
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 3 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
JCDL
2005
ACM
95views Education» more  JCDL 2005»
15 years 3 months ago
Link prediction approach to collaborative filtering
Recommender systems can provide valuable services in a digital library environment, as demonstrated by its commercial success in book, movie, and music industries. One of the most...
Zan Huang, Xin Li, Hsinchun Chen
ICCV
2003
IEEE
15 years 3 months ago
An automatic drowning detection surveillance system for challenging outdoor pool environments
Automatically understanding events happening at a site is the ultimate goal of visual surveillance system. This paper investigates the challenges faced by automated surveillance s...
How-Lung Eng, Kar-Ann Toh, Alvin Harvey Kam, Junxi...
« Prev « First page 1192 / 1302 Last » Next »