Sciweavers

16513 search results - page 3128 / 3303
» Numerical Analysis Methods
Sort
View
98
Voted
DSN
2005
IEEE
15 years 9 months ago
A Model of Stateful Firewalls and Its Properties
We propose the first model of stateful firewalls. In this model, each stateful firewall has a variable set called the state of the firewall, which is used to store some packet...
Mohamed G. Gouda, Alex X. Liu
133
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du
156
Voted
MM
2005
ACM
187views Multimedia» more  MM 2005»
15 years 9 months ago
Augmented segmentation and visualization for presentation videos
We investigate methods of segmenting, visualizing, and indexing presentation videos by both audio and visual data. The audio track is segmented by speaker, and augmented with key ...
Alexander Haubold, John R. Kender
134
Voted
SIGECOM
2005
ACM
105views ECommerce» more  SIGECOM 2005»
15 years 9 months ago
Towards truthful mechanisms for binary demand games: a general framework
The family of Vickrey-Clarke-Groves (VCG) mechanisms is arguably the most celebrated achievement in truthful mechanism design. However, VCG mechanisms have their limitations. They...
Ming-Yang Kao, Xiang-Yang Li, Weizhao Wang
148
Voted
SIGIR
2005
ACM
15 years 9 months ago
Orthogonal locality preserving indexing
We consider the problem of document indexing and representation. Recently, Locality Preserving Indexing (LPI) was proposed for learning a compact document subspace. Different from...
Deng Cai, Xiaofei He
« Prev « First page 3128 / 3303 Last » Next »