Sciweavers

5019 search results - page 998 / 1004
» Computing in Quotient Groups
Sort
View
JSAC
2010
166views more  JSAC 2010»
14 years 10 months ago
Phero-trail: a bio-inspired location service for mobile underwater sensor networks
A SEA Swarm (Sensor Equipped Aquatic Swarm) moves as a group with water current and enables 4D (space and time) monitoring of local underwater events such as contaminants and intr...
Luiz Filipe M. Vieira, Uichin Lee, Mario Gerla
JSYML
2010
107views more  JSYML 2010»
14 years 10 months ago
A proof of completeness for continuous first-order logic
Continuous first-order logic has found interest among model theorists who wish to extend the classical analysis of “algebraic” structures (such as fields, group, and graphs) ...
Arthur Paul Pedersen, Itay Ben-Yaacov
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
14 years 10 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Today...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
SCN
2010
Springer
187views Communications» more  SCN 2010»
14 years 10 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
TIP
2010
138views more  TIP 2010»
14 years 10 months ago
Motion Tuned Spatio-Temporal Quality Assessment of Natural Videos
—There has recently been a great deal of interest in the development of algorithms that objectively measure the integrity of video signals. Since video signals are being delivere...
Kalpana Seshadrinathan, Alan C. Bovik