Sciweavers

12257 search results - page 2129 / 2452
» Analysis of Algorithms
Sort
View
SENSYS
2005
ACM
15 years 10 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
SIGIR
2005
ACM
15 years 10 months ago
A phonotactic-semantic paradigm for automatic spoken document classification
We demonstrate a phonotactic-semantic paradigm for spoken document categorization. In this framework, we define a set of acoustic words instead of lexical words to represent acous...
Bin Ma, Haizhou Li
WOWMOM
2005
ACM
127views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
Game Theoretic Power Aware Wireless Data Access
Abstract—This paper examines the following wireless data access scenario: a number of clients are interested in a set of data items kept at the server. A client sends a query req...
Mark Kai Ho Yeung, Yu-Kwong Kwok
WS
2005
ACM
15 years 10 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du
AIIA
2005
Springer
15 years 10 months ago
Mining Relational Association Rules for Propositional Classification
In traditional classification setting, training data are represented as a single table, where each row corresponds to an example and each column to a predictor variable or the targ...
Annalisa Appice, Michelangelo Ceci, Donato Malerba
« Prev « First page 2129 / 2452 Last » Next »