Sciweavers

679 search results - page 89 / 136
» Using decision problems in public key cryptography
Sort
View
GLOBECOM
2010
IEEE
14 years 11 months ago
Cooperation Stimulation in Cognitive Networks Using Indirect Reciprocity Game Modelling
In cognitive networks, since nodes generally belong to different authorities and pursue different goals, they will not cooperate with others unless cooperation can improve their ow...
Yan Chen, K. J. Ray Liu
IJCAT
2010
132views more  IJCAT 2010»
14 years 11 months ago
Using weaving models to automate model-driven web engineering proposals
The impact of Model-Driven Software Development in Web Engineering has given raise to the advent of Model-Driven Web Engineering, a new approach for Web Information Systems develop...
Juan M. Vara, Valeria de Castro, Marcos Didonet De...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 1 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
ICDE
2007
IEEE
120views Database» more  ICDE 2007»
15 years 7 months ago
Optimizing State-Intensive Non-Blocking Queries Using Run-time Adaptation
Main memory is a critical resource when processing non-blocking queries with state intensive operators that require real-time responses. While partitioned parallel processing can ...
Bin Liu, Mariana Jbantova, Elke A. Rundensteiner
ESCIENCE
2005
IEEE
15 years 7 months ago
The SegHidro Experience: Using the Grid to Empower a Hydro-Meteorological Scientific Network
This paper describes our experience with SegHidro, a project that empowers hydro-meteorological researchers by (i) enabling collaborative work via the coupling of computer models,...
Eliane Araújo, Walfredo Cirne, Gustavo Wagn...