Sciweavers

681 search results - page 107 / 137
» Aspects for Trace Monitoring
Sort
View
INFOCOM
2007
IEEE
15 years 6 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
CEAS
2007
Springer
15 years 6 months ago
Discovering Leadership Roles in Email Workgroups
Email is a key communication tool for collaborative workgroups. In this paper, we investigate how team leadership roles can be inferred from a collection of email messages exchang...
Vitor R. Carvalho, Wen Wu, William W. Cohen
ECSQARU
2007
Springer
15 years 6 months ago
Forward-Backward-Viterbi Procedures in the Transferable Belief Model for State Sequence Analysis Using Belief Functions
Abstract. The Transferable Belief Model (TBM) relies on belief functions and enables one to represent and combine a variety of knowledge from certain up to ignorance as well as con...
Emmanuel Ramasso, Michèle Rombaut, Denis Pe...
GECON
2007
Springer
124views Business» more  GECON 2007»
15 years 6 months ago
On Business Grid Demands and Approaches
This paper addresses necessary modification and extensions of existing Grid Computing approaches in order to meet nowadays business demand. So far, Grid Computing has been used to...
Carsten Franke, Adolf Hohl, Philip Robinson, Bernd...
ISBRA
2007
Springer
15 years 6 months ago
Noise-Based Feature Perturbation as a Selection Method for Microarray Data
Abstract. DNA microarrays can monitor the expression levels of thousands of genes simultaneously, providing the opportunity for the identification of genes that are differentiall...
Li Chen, Dmitry B. Goldgof, Lawrence O. Hall, Stev...