Sciweavers

497 search results - page 86 / 100
» A Really Good Idea
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach
— When a sensor network is deployed in hostile environments, the adversary may compromise some sensor nodes, and use the compromised nodes to inject false sensing reports or modi...
Wensheng Zhang, Guohong Cao
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach
Service discovery in mobile ad hoc networks is challenging because of the absence of any central intelligence in the network. Traditional solutions as used in the Internet are hen...
Vincent Lenders, Martin May, Bernhard Plattner
BPM
2005
Springer
126views Business» more  BPM 2005»
14 years 3 months ago
Genetic Process Mining: A Basic Approach and Its Challenges
One of the aims of process mining is to retrieve a process model from a given event log. However, current techniques have problems when mining processes that contain non-trivial co...
Ana Karla A. de Medeiros, A. J. M. M. Weijters, Wi...
ISMIR
2005
Springer
196views Music» more  ISMIR 2005»
14 years 3 months ago
ACE: A Framework for Optimizing Music Classification
This paper presents ACE (Autonomous Classification Engine), a framework for using and optimizing classifiers. Given a set of feature vectors, ACE experiments with a variety of cla...
Cory McKay, Rebecca Fiebrink, Daniel McEnnis, Bein...
POLICY
2005
Springer
14 years 3 months ago
Enhancing Web Privacy Protection through Declarative Policies
The Platform for Privacy Preferences (P3P) is a W3C framework for web privacy management. It provides a standard vocabulary that websites can use to describe their privacy practic...
Pranam Kolari, Li Ding, Shashidhara Ganjugunte, An...