Sciweavers

1423 search results - page 188 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
SACMAT
2011
ACM
14 years 24 days ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
ICDM
2007
IEEE
174views Data Mining» more  ICDM 2007»
15 years 4 months ago
Targeting Input Data for Acoustic Bird Species Recognition Using Data Mining and HMMs
In this paper we propose the integration of Data Mining with Hidden Markov Models when applied to the problem of acoustic bird species recognition. We first show how each of them...
Erika Vilches, Ivan A. Escobar, Edgar E. Vallejo, ...
CIKM
2008
Springer
14 years 12 months ago
Efficient sampling of information in social networks
As online social networking emerges, there has been increased interest to utilize the underlying social structure as well as the available social information to improve search. In...
Gautam Das, Nick Koudas, Manos Papagelis, Sushruth...
ESAS
2004
Springer
15 years 3 months ago
Secure AES Hardware Module for Resource Constrained Devices
Abstract. Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as...
Elena Trichina, Tymur Korkishko
GISCIENCE
2010
Springer
230views GIS» more  GISCIENCE 2010»
14 years 10 months ago
Detecting Change in Snapshot Sequences
Wireless sensor networks are deployed to monitor dynamic geographic phenomena, or objects, over space and time. This paper presents a new spatiotemporal data model for dynamic area...
Mingzheng Shi, Stephan Winter