Sciweavers

1156 search results - page 57 / 232
» The PENG System: Practice and Experience
Sort
View
CIKM
2007
Springer
15 years 5 months ago
Optimizing parallel itineraries for knn query processing in wireless sensor networks
Spatial queries for extracting data from wireless sensor networks are important for many applications, such as environmental monitoring and military surveillance. One such query i...
Tao-Young Fu, Wen-Chih Peng, Wang-Chien Lee
GCC
2005
Springer
15 years 4 months ago
Using Fuzzy Cognitive Map to Effectively Classify E-Documents and Application
In the current Web, e-document has been the most common vehicle for delivering and exchanging information. As the amount of e-documents has grown enormously, effective classificati...
Jianzeng Wang, Yunpeng Xing, Peng Shi, Fei Guo, Zh...
LCPC
2001
Springer
15 years 3 months ago
Probabilistic Points-to Analysis
Information gathered by the existing pointer analysis techniques can be classified as must aliases or definitely-points-to relationships, which hold for all executions, and may a...
Yuan-Shin Hwang, Peng-Sheng Chen, Jenq Kuen Lee, R...
PCM
2005
Springer
152views Multimedia» more  PCM 2005»
15 years 4 months ago
Apollon: File System Level Support for QoS Augmented I/O
Abstract. Next generation information appliances are required to handle realtime audio/video playback and in the mean time should be able to handle text based requests such as data...
Taeseok Kim, Youjip Won, Doohan Kim, Kern Koh, Yon...
ESORICS
2006
Springer
15 years 2 months ago
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...