Sciweavers

5019 search results - page 998 / 1004
» Computing in Quotient Groups
Sort
View
130
Voted
JSAC
2010
166views more  JSAC 2010»
15 years 8 days ago
Phero-trail: a bio-inspired location service for mobile underwater sensor networks
A SEA Swarm (Sensor Equipped Aquatic Swarm) moves as a group with water current and enables 4D (space and time) monitoring of local underwater events such as contaminants and intr...
Luiz Filipe M. Vieira, Uichin Lee, Mario Gerla
JSYML
2010
107views more  JSYML 2010»
15 years 8 days ago
A proof of completeness for continuous first-order logic
Continuous first-order logic has found interest among model theorists who wish to extend the classical analysis of “algebraic” structures (such as fields, group, and graphs) ...
Arthur Paul Pedersen, Itay Ben-Yaacov
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
15 years 8 days ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Today...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
SCN
2010
Springer
187views Communications» more  SCN 2010»
15 years 6 days ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
126
Voted
TIP
2010
138views more  TIP 2010»
15 years 6 days ago
Motion Tuned Spatio-Temporal Quality Assessment of Natural Videos
—There has recently been a great deal of interest in the development of algorithms that objectively measure the integrity of video signals. Since video signals are being delivere...
Kalpana Seshadrinathan, Alan C. Bovik