Sciweavers

8647 search results - page 1335 / 1730
» The Container Selection Problem
Sort
View
DASFAA
2008
IEEE
188views Database» more  DASFAA 2008»
15 years 11 months ago
Summarization Graph Indexing: Beyond Frequent Structure-Based Approach
Graph is an important data structure to model complex structural data, such as chemical compounds, proteins, and XML documents. Among many graph data-based applications, sub-graph ...
Lei Zou, Lei Chen 0002, Huaming Zhang, Yansheng Lu...
INFOCOM
2008
IEEE
15 years 11 months ago
Robust Planarization of Unlocalized Wireless Sensor Networks
Abstract—Wireless sensor networks need very efficient network protocols due to the sensors’ limited communication and computation capabilities. Network planarization – find...
Fenghui Zhang, Anxiao Jiang, Jianer Chen
WACV
2008
IEEE
15 years 11 months ago
Localization and Segmentation of A 2D High Capacity Color Barcode
A 2D color barcode can hold much more information than a binary barcode. Barcodes are often intended for consumer use, such as, a consumer can take an image with her cellphone cam...
Devi Parikh, Gavin Jancke
115
Voted
ICC
2007
IEEE
110views Communications» more  ICC 2007»
15 years 11 months ago
Distributed Early Worm Detection Based on Payload Histograms
— Epidemic worms has become a social problem owing to their potency in paralyzing the Internet, thus affecting our way of life. Recent researches have pointed out that epidemic w...
Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirw...
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 11 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
« Prev « First page 1335 / 1730 Last » Next »