Sciweavers

12487 search results - page 2395 / 2498
» Graspable Work Modeling
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 9 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ISNN
2005
Springer
15 years 9 months ago
One-Bit-Matching ICA Theorem, Convex-Concave Programming, and Combinatorial Optimization
Recently, a mathematical proof is obtained in (Liu, Chiu, Xu, 2004) on the so called one-bit-matching conjecture that all the sources can be separated as long as there is an one-to...
Lei Xu
MIDDLEWARE
2005
Springer
15 years 9 months ago
Distributed collaboration for event detection in wireless sensor networks
With the advancement of technology in micro-electronics and wireless communication, small miniature devices called sensor nodes can be used to perform various tasks by forming the...
A. V. U. Phani Kumar, Adi Mallikarjuna Reddy V, D....
OOPSLA
2005
Springer
15 years 9 months ago
Micro patterns in Java code
Micro patterns are similar to design patterns, except that micro patterns stand at a lower, closer to the implementation, level of abstraction. Micro patterns are also unique in t...
Joseph Gil, Itay Maman
POLICY
2005
Springer
15 years 9 months ago
Enhancing Web Privacy Protection through Declarative Policies
The Platform for Privacy Preferences (P3P) is a W3C framework for web privacy management. It provides a standard vocabulary that websites can use to describe their privacy practic...
Pranam Kolari, Li Ding, Shashidhara Ganjugunte, An...
« Prev « First page 2395 / 2498 Last » Next »