Sciweavers

384 search results - page 49 / 77
» On understanding data abstraction, revisited
Sort
View
DBSEC
2008
137views Database» more  DBSEC 2008»
14 years 11 months ago
Towards Automation of Testing High-Level Security Properties
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...
MTA
2006
115views more  MTA 2006»
14 years 9 months ago
Cache modeling and optimization for portable devices running MPEG-4 video decoder
Abstract There are increasing demands on portable communication devices to run multimedia applications. ISO (an International Organization for Standardization) standard MPEG-4 is a...
Abu Asaduzzaman, Imad Mahgoub
EUROSSC
2010
Springer
14 years 7 months ago
Identifying Important Action Primitives for High Level Activity Recognition
Smart homes have a user centered design that makes human activity as the most important type of context to adapt the environment according to people's needs. Sensor systems th...
Atif Manzoor, Claudia Villalonga, Alberto Calatron...
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
14 years 7 months ago
K-AP: Generating Specified K Clusters by Efficient Affinity Propagation
Abstract--The Affinity Propagation (AP) clustering algorithm proposed by Frey and Dueck (2007) provides an understandable, nearly optimal summary of a data set. However, it suffers...
Xiangliang Zhang, Wei Wang, Kjetil Nørv&ari...
ICDM
2010
IEEE
202views Data Mining» more  ICDM 2010»
14 years 7 months ago
Discovering Overlapping Groups in Social Media
Abstract--The increasing popularity of social media is shortening the distance between people. Social activities, e.g., tagging in Flickr, bookmarking in Delicious, twittering in T...
Xufei Wang, Lei Tang, Huiji Gao, Huan Liu