Sciweavers

171 search results - page 16 / 35
» cse 2009
Sort
View
CSE
2009
IEEE
14 years 10 months ago
Mining Mobility Behavior from Trajectory Data
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes o...
Fosca Giannotti, Mirco Nanni, Dino Pedreschi, Chia...
73
Voted
DATE
2009
IEEE
120views Hardware» more  DATE 2009»
15 years 4 months ago
Optimizing data flow graphs to minimize hardware implementation
Abstract - This paper describes an efficient graphbased method to optimize data-flow expressions for best hardware implementation. The method is based on factorization, common su...
Daniel Gomez-Prado, Q. Ren, Maciej J. Ciesielski, ...
CSE
2009
IEEE
15 years 2 months ago
Gaming On and Off the Social Graph: The Social Structure of Facebook Games
—Games built on Online Social Networks (OSNs) have become a phenomenon since 3rd party developer tools were exposed by OSNs such as Facebook. However, apart from their explosive ...
Ben Kirman, Shaun Lawson, Conor Linehan
CSE
2009
IEEE
15 years 4 months ago
A Lightweight Architecture for Secure Two-Party Mobile Payment
The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems. In this paper we propose SA2pMP,...
Yunpu Zhu, Jacqueline E. Rice
CSE
2009
IEEE
15 years 4 months ago
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments
—Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach...
Chenjia Wang, Kevin P. Monaghan, Weisong Shi