Sciweavers

8655 search results - page 1394 / 1731
» Challenges for Trusted Computing
Sort
View
131
Voted
IPM
2008
133views more  IPM 2008»
15 years 3 months ago
DistanceRank: An intelligent ranking algorithm for web pages
A fast and efficient page ranking mechanism for web crawling and retrieval remains as a challenging issue. Recently, several link based ranking algorithms like PageRank, HITS and ...
Ali Mohammad Zareh Bidoki, Nasser Yazdani
137
Voted
IS
2008
15 years 3 months ago
Continuous subspace clustering in streaming time series
Performing data mining tasks in streaming data is considered a challenging research direction, due to the continuous data evolution. In this work, we focus on the problem of clust...
Maria Kontaki, Apostolos N. Papadopoulos, Yannis M...
136
Voted
IJCOMSYS
2006
105views more  IJCOMSYS 2006»
15 years 3 months ago
Service oriented architecture for VoIP conferencing
Voice/Video over IP (VoIP) systems to date have been either highly centralized or dependent on the IP multicast in nature. Global Multimedia Collaboration System is a scalable, in...
Wenjun Wu, Geoffrey Fox, Hasan Bulut, Ahmet Uyar, ...
128
Voted
IJCV
2006
124views more  IJCV 2006»
15 years 3 months ago
Representation Analysis and Synthesis of Lip Images Using Dimensionality Reduction
Understanding facial expressions in image sequences is an easy task for humans. Some of us are capable of lipreading by interpreting the motion of the mouth. Automatic lipreading b...
Michal Aharon, Ron Kimmel
128
Voted
ITIIS
2008
128views more  ITIIS 2008»
15 years 3 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
« Prev « First page 1394 / 1731 Last » Next »