Sciweavers

863 search results - page 132 / 173
» Computational Methods for Intelligent Information Access
Sort
View
136
Voted
WISEC
2009
ACM
15 years 10 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
118
Voted
CSE
2009
IEEE
15 years 10 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
144
Voted
ICICIC
2006
IEEE
15 years 9 months ago
Fingerprint Identification Based on Frequency Texture Analysis
Nowadays the AFIS (Automatic fingerprint Identification system) plays more and more important roles in various applications such as access control, ATM card verification and crimi...
Juncao Li, Yong Zhang, Wenhai Kong, Xiamu Niu
157
Voted
SSD
2005
Springer
105views Database» more  SSD 2005»
15 years 9 months ago
Evaluation of Top-k OLAP Queries Using Aggregate R-Trees
Abstract. A top-k OLAP query groups measures with respect to some abstraction level of interesting dimensions and selects the k groups with the highest aggregate value. An example ...
Nikos Mamoulis, Spiridon Bakiras, Panos Kalnis
137
Voted
MHCI
2004
Springer
15 years 9 months ago
Web Page Transformation When Switching Devices
With network and small screen device improvements, such as wireless abilities, increased memory and CPU speeds, users are no longer limited by location when accessing on-line infor...
Bonnie MacKay, Carolyn R. Watters, Jack Duffy