Sciweavers

7623 search results - page 1201 / 1525
» Constructive Volume Modeling
Sort
View
133
Voted
ICDM
2010
IEEE
132views Data Mining» more  ICDM 2010»
15 years 2 months ago
Monotone Relabeling in Ordinal Classification
In many applications of data mining we know beforehand that the response variable should be increasing (or decreasing) in the attributes. Such relations between response and attrib...
Ad Feelders
INFOCOM
2010
IEEE
15 years 2 months ago
On Computing Compression Trees for Data Collection in Wireless Sensor Networks
We address the problem of efficiently gathering correlated data from a wireless sensor network, with the aim of designing algorithms with provable optimality guarantees, and unders...
Jian Li, Amol Deshpande, Samir Khuller
SOCIALCOM
2010
15 years 2 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 2 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
ICDAR
2009
IEEE
15 years 2 months ago
A Multi-Hypothesis Approach for Off-Line Signature Verification with HMMs
In this paper, an approach based on the combination of discrete Hidden Markov Models (HMMs) in the ROC space is proposed to improve the performance of off-line signature verificat...
Luana Batista, Eric Granger, Robert Sabourin
« Prev « First page 1201 / 1525 Last » Next »