Sciweavers

703 search results - page 79 / 141
» On Addressing the Computer Science Crisis
Sort
View
ACMSE
2006
ACM
15 years 5 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
ICALP
2009
Springer
16 years 3 days ago
Node-Weighted Steiner Tree and Group Steiner Tree in Planar Graphs
We improve the approximation ratios for two optimization problems in planar graphs. For node-weighted Steiner tree, a classical network-optimization problem, the best achievable ap...
Erik D. Demaine, MohammadTaghi Hajiaghayi, Philip ...
SDM
2009
SIAM
173views Data Mining» more  SDM 2009»
15 years 9 months ago
Discretized Spatio-Temporal Scan Window.
The focus of this paper is the discovery of anomalous spatio-temporal windows. We propose a Discretized SpatioTemporal Scan Window approach to address the question of how we can t...
Aryya Gangopadhyay, Seyed H. Mohammadi, Vandana Pu...
ECIR
2009
Springer
15 years 9 months ago
Active Sampling for Rank Learning via Optimizing the Area under the ROC Curve
Abstract. Learning ranking functions is crucial for solving many problems, ranging from document retrieval to building recommendation systems based on an individual user’s prefer...
Pinar Donmez, Jaime G. Carbonell
NSPW
2004
ACM
15 years 5 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...