Sciweavers

6906 search results - page 31 / 1382
» An algorithm for modelling key terms
Sort
View
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 4 months ago
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Ratna Dutta, Yong Dong Wu, Sourav Mukhopadhyay
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 4 months ago
Simulative Analysis of a Multi-Cell Admission Control Algorithm in WCDMA Networks
— It has for long been recognized that in multi-cell wide-band code division multiple access (WCDMA) networks the admission of a new session into the system can have undesirable ...
Gábor Fodor, Gustavo Azzolin
SASN
2003
ACM
15 years 3 months ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning
ACMSE
2006
ACM
15 years 3 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
15 years 3 months ago
Key semantics extraction by dependency tree mining
We propose a new text mining system which extracts characteristic contents from given documents. We define Key semantics as characteristic sub-structures of syntactic dependencie...
Satoshi Morinaga, Hiroki Arimura, Takahiro Ikeda, ...