Sciweavers

21984 search results - page 4219 / 4397
» C
Sort
View
JCP
2006
139views more  JCP 2006»
15 years 4 months ago
Generalized Sequential Pattern Mining with Item Intervals
Sequential pattern mining is an important data mining method with broad applications that can extract frequent sequences while maintaining their order. However, it is important to ...
Yu Hirate, Hayato Yamana
JUCS
2008
177views more  JUCS 2008»
15 years 4 months ago
An Improved Multi-Agent Simulation Methodology for Modelling and Evaluating Wireless Communication Systems Resource Allocation A
: Multi-Agent Systems (MAS) constitute a well known approach in modelling dynamical real world systems. Recently, this technology has been applied to Wireless Communication Systems...
P. M. Papazoglou, Dimitris A. Karras, Rallis C. Pa...
JUCS
2008
113views more  JUCS 2008»
15 years 4 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
JUCS
2008
149views more  JUCS 2008»
15 years 4 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
DSS
2007
113views more  DSS 2007»
15 years 4 months ago
An information delivery system with automatic summarization for mobile commerce
Wireless access with handheld devices is a promising addition to the WWW and traditional electronic business. Handheld devices provide convenience and portable access to the huge ...
Christopher C. Yang, Fu Lee Wang
« Prev « First page 4219 / 4397 Last » Next »