Sciweavers

11121 search results - page 1874 / 2225
» Computing with Continuous Change
Sort
View
CCS
2009
ACM
16 years 5 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
PERCOM
2009
ACM
16 years 5 months ago
Practical Rate Adaptation in Mobile Environments
Channel asymmetry and high fluctuation of channel conditions are two salient characteristics of wireless channels in mobile environments. Therefore, when using IEEE 802.11 devices ...
Xi Chen, Prateek Gangwal, Daji Qiao
EWSN
2009
Springer
16 years 5 months ago
A Context and Content-Based Routing Protocol for Mobile Sensor Networks
Abstract. The need of monitoring people, animals, and things in general, brings to consider mobile WSNs besides traditional, fixed ones. Moreover, several advanced scenarios, like ...
Gianpaolo Cugola, Matteo Migliavacca
KDD
2008
ACM
142views Data Mining» more  KDD 2008»
16 years 5 months ago
Weighted graphs and disconnected components: patterns and a generator
The vast majority of earlier work has focused on graphs which are both connected (typically by ignoring all but the giant connected component), and unweighted. Here we study numer...
Mary McGlohon, Leman Akoglu, Christos Faloutsos
KDD
2008
ACM
209views Data Mining» more  KDD 2008»
16 years 5 months ago
Combinational collaborative filtering for personalized community recommendation
Rapid growth in the amount of data available on social networking sites has made information retrieval increasingly challenging for users. In this paper, we propose a collaborativ...
WenYen Chen, Dong Zhang, Edward Y. Chang
« Prev « First page 1874 / 2225 Last » Next »