Sciweavers

970 search results - page 101 / 194
» A comprehensive analysis of hyper-heuristics
Sort
View
SECON
2007
IEEE
14 years 2 months ago
Multi-user Broadcast Authentication in Wireless Sensor Networks
— Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes...
Kui Ren, Wenjing Lou, Yanchao Zhang
SEMWEB
2007
Springer
14 years 2 months ago
ArnetMiner: An Expertise Oriented Search System for Web Community
Expertise Oriented Search aims at providing comprehensive analysis and mining for people from distributed sources. In this paper, we give an overview of the expertise oriented sear...
Jie Tang, Jing Zhang, Duo Zhang, Limin Yao, Chunli...
GLOBECOM
2006
IEEE
14 years 2 months ago
Efficient Construction of Weakly-Connected Dominating Set for Clustering Wireless Ad Hoc Networks
In most of the proposed clustering algorithms for wireless ad hoc networks, the cluster-heads form a dominating set in the network topology. A variant of dominating set which is mo...
Bo Han, Weijia Jia
HICSS
2006
IEEE
161views Biometrics» more  HICSS 2006»
14 years 2 months ago
The Collaboration Engineering Maturity Model
The focus of this paper is to introduce a comprehensive model for assessing and improving the maturity of Collaboration Engineering (CE) processes. The model is targeted at introd...
Eric L. Santanen, Gwendolyn L. Kolfschoten, Kastur...
SMI
2006
IEEE
164views Image Analysis» more  SMI 2006»
14 years 2 months ago
Mesh Segmentation - A Comparative Study
Mesh segmentation has become an important component in many applications in computer graphics. In the last several years, many algorithms have been proposed in this growing area, ...
Marco Attene, S. Katz, Michela Mortara, Giuseppe P...