Sciweavers

34181 search results - page 6694 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
134
Voted
IJNSEC
2007
126views more  IJNSEC 2007»
15 years 3 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
130
Voted
TCS
2008
15 years 3 months ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
153
Voted
IS
2007
15 years 3 months ago
Evaluation of probabilistic queries over imprecise data in constantly-evolving environments
Sensors are often employed to monitor continuously changing entities like locations of moving objects and temperature. The sensor readings are reported to a database system, and a...
Reynold Cheng, Dmitri V. Kalashnikov, Sunil Prabha...
116
Voted
TDP
2008
111views more  TDP 2008»
15 years 3 months ago
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
The demand for high quality microdata for analytical purposes has grown rapidly among researchers and the public over the last few years. In order to respect existing laws on data ...
Matthias Templ
144
Voted
TFS
2008
116views more  TFS 2008»
15 years 3 months ago
Fuzzifying Allen's Temporal Interval Relations
When the time span of an event is imprecise, it can be represented by a fuzzy set, called a fuzzy time interval. In this paper, we propose a framework to represent, compute, and re...
Steven Schockaert, Martine De Cock, Etienne E. Ker...
« Prev « First page 6694 / 6837 Last » Next »