Sciweavers

798 search results - page 120 / 160
» presence 2006
Sort
View
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 1 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
AUSDM
2006
Springer
144views Data Mining» more  AUSDM 2006»
15 years 1 months ago
Mining Quantitative Association Rules in Protein Sequences
Abstract. Lot of research has gone into understanding the composition and nature of proteins, still many things remain to be understood satisfactorily. It is now generally believed...
Nitin Gupta, Nitin Mangal, Kamal Tiwari, Pabitra M...
78
Voted
DAWAK
2006
Springer
15 years 1 months ago
Efficient Mining of Dissociation Rules
Abstract. Association rule mining is one of the most popular data mining techniques. Significant work has been done to extend the basic association rule framework to allow for mini...
Mikolaj Morzy
DCOSS
2006
Springer
15 years 1 months ago
Consistency-Based On-line Localization in Sensor Networks
Abstract. We have developed a new on-line error modeling and optimizationbased localization approach for sensor networks in the presence of distance measurement noise. The approach...
Jessica Feng, Lewis Girod, Miodrag Potkonjak
DGCI
2006
Springer
15 years 1 months ago
Skeleton Pruning by Contour Partitioning
Abstract-- In this paper, we introduce a new skeleton pruning method based on contour partitioning. Any contour partition can be used, but the partitions obtained by Discrete Curve...
Xiang Bai, Longin Jan Latecki, Wenyu Liu