Sciweavers

42388 search results - page 8291 / 8478
» Classification Using Information
Sort
View
SAC
2006
ACM
15 years 9 months ago
Semantic analysis of web site audience
With the emergence of the World Wide Web, analyzing and improving Web communication has become essential to adapt the Web content to the visitors’ expectations. Web communicatio...
Jean-Pierre Norguet, Esteban Zimányi, Ralf ...
SACMAT
2006
ACM
15 years 9 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
SASN
2006
ACM
15 years 9 months ago
Attack-resilient hierarchical data aggregation in sensor networks
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Sankardas Roy, Sanjeev Setia, Sushil Jajodia
SENSYS
2006
ACM
15 years 9 months ago
StarDust: a flexible architecture for passive localization in wireless sensor networks
The problem of localization in wireless sensor networks where nodes do not use ranging hardware, remains a challenging problem, when considering the required location accuracy, en...
Radu Stoleru, Pascal Vicaire, Tian He, John A. Sta...
138
Voted
SIGCSE
2006
ACM
130views Education» more  SIGCSE 2006»
15 years 9 months ago
Scavenger hunt: computer science retention through orientation
This paper describes Scavenger Hunt, a team-based orientation activity for incoming freshmen in the Department of Computer Science at the University of Illinois at Urbana-Champaig...
Jerry O. Talton, Daniel L. Peterson, Sam Kamin, De...
« Prev « First page 8291 / 8478 Last » Next »