Sciweavers

554 search results - page 49 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
EOR
2011
172views more  EOR 2011»
13 years 2 months ago
Efficiency measurement using independent component analysis and data envelopment analysis
Efficiency measurement is an important issue for any firm or organization. Efficiency measurement allows organizations to compare their performance with their competitors’ and t...
Ling-Jing Kao, Chi-Jie Lu, Chih-Chou Chiu
RIDE
2002
IEEE
14 years 17 days ago
Extensible Data Management in the Middle-Tier
Current data management solutions are largely optimized for intra-enterprise, client-server applications. They depend on predictability, predefined structure, and universal admini...
Brian F. Cooper, Neal Sample, Michael J. Franklin,...
ICC
2007
IEEE
245views Communications» more  ICC 2007»
14 years 2 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
ICOST
2011
Springer
12 years 11 months ago
Domain Selection and Adaptation in Smart Homes
Abstract. Recently researchers have proposed activity recognition methods based on adapting activity knowledge obtained in previous spaces to a new space. Adapting activity knowled...
Parisa Rashidi, Diane J. Cook
FOIKS
2004
Springer
13 years 11 months ago
Simplification of Integrity Constraints for Data Integration
When two or more databases are combined into a global one, integrity may be violated even when each database is consistent with its own local integrity constraints. Efficient metho...
Henning Christiansen, Davide Martinenghi