Sciweavers

3651 search results - page 570 / 731
» Data Mining for Security Applications
Sort
View
CSE
2011
IEEE
14 years 5 months ago
Parallel Execution of AES-CTR Algorithm Using Extended Block Size
—Data encryption and decryption are common operations in a network based application programs with security. In order to keep pace with the input data rate in such applications, ...
Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Seung-...
LCN
2008
IEEE
15 years 11 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
DASFAA
2008
IEEE
190views Database» more  DASFAA 2008»
15 years 11 months ago
Analysis of Time Series Using Compact Model-Based Descriptions
Abstract. Recently, we have proposed a novel method for the compression of time series based on mathematical models that explore dependencies between different time series. This r...
Hans-Peter Kriegel, Peer Kröger, Alexey Pryak...
KDD
2002
ACM
164views Data Mining» more  KDD 2002»
16 years 5 months ago
Meta-classification: Combining Multimodal Classifiers
Combining multiple classifiers is of particular interest in multimedia applications. Each modality in multimedia data can be analyzed individually, and combining multiple pieces of...
Wei-Hao Lin, Alexander G. Hauptmann
152
Voted
MIE
2008
119views Healthcare» more  MIE 2008»
15 years 6 months ago
Reliable Personal Health Records
A number of applications based on personal health records (PHRs) are emerging in the field of health care and wellness. PHRs empower patients by giving them control over their heal...
Ton van Deursen, Paul Koster, Milan Petkovic