Sciweavers

2066 search results - page 272 / 414
» Word Maturity: Computational Modeling of Word Knowledge
Sort
View
ICML
2008
IEEE
16 years 19 days ago
Fully distributed EM for very large datasets
In EM and related algorithms, E-step computations distribute easily, because data items are independent given parameters. For very large data sets, however, even storing all of th...
Jason Wolfe, Aria Haghighi, Dan Klein
WWW
2005
ACM
16 years 14 days ago
Enhancing the privacy of web-based communication
A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
PERCOM
2008
ACM
15 years 11 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
QSHINE
2009
IEEE
15 years 6 months ago
On-Demand Node Reclamation and Replacement for Guaranteed Area Coverage in Long-Lived Sensor Networks
To achieve required sensing coverage for a very long period of time is an important and challenging problem in sensor network design. Recently, Tong et al. have proposed a node rep...
Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang
ICEIS
2009
IEEE
15 years 6 months ago
Towards Successful Virtual Communities
With the multiplication of communication medium, the increasing multi-partner global organizations, the remote working tendencies, dynamic teams, pervasive or ubiquitous computing ...
Julien Subercaze, Christo El-Morr, Pierre Maret, A...