Sciweavers

3907 search results - page 597 / 782
» Time, Knowledge, and Choice
Sort
View
LCN
2008
IEEE
15 years 7 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
62
Voted
PIMRC
2008
IEEE
15 years 7 months ago
Multi-hop discovery of Candidate Access Routers (MHD-CAR) for fast moving mobile nodes
—Seamless IP mobility protocols like Fast Mobile IPv6 (FMIPv6) requires the knowledge of candidate access routers, to which the mobile node will hand over its connection to, well...
Faqir Zarrar Yousaf, Christian Muller, Christian W...
99
Voted
SISAP
2008
IEEE
175views Data Mining» more  SISAP 2008»
15 years 7 months ago
Anytime K-Nearest Neighbor Search for Database Applications
Many contemporary database applications require similarity-based retrieval of complex objects where the only usable knowledge of its domain is determined by a metric distance func...
Weijia Xu, Daniel P. Miranker, Rui Mao, Smriti R. ...
WCRE
2008
IEEE
15 years 7 months ago
Retrieving Task-Related Clusters from Change History
During software maintenance tasks, developers often spend an important amount of effort investigating source code. This effort can be reduced if tools are available to help develo...
Martin P. Robillard, Barthélémy Dage...
ACSAC
2007
IEEE
15 years 7 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...