Sciweavers

4076 search results - page 802 / 816
» A framework for developing distributed location based applic...
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...
ICC
2008
IEEE
105views Communications» more  ICC 2008»
14 years 2 months ago
Inter-Cell Interference Management in WiMAX Downlinks by A Stackelberg Game between BSs
We develop a game theoretic framework for effective and adaptive inter-cell interference management in the OFDMA-based WiMAX/3GPP-LTE systems. Such approach requires no fixed spe...
Yingda Chen, Koon Hoo Teo, Shalinee Kishore, Jinyu...
DEXA
2007
Springer
154views Database» more  DEXA 2007»
14 years 1 months ago
Beyond Lazy XML Parsing
XML has become the standard format for data representation and exchange in domains ranging from Web to desktop applications. However, wide adoption of XML is hindered by inefficien...
Fernando Farfán, Vagelis Hristidis, Raju Ra...
IWDW
2007
Springer
14 years 1 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
PKC
2007
Springer
124views Cryptology» more  PKC 2007»
14 years 1 months ago
Practical and Secure Solutions for Integer Comparison
Abstract. Yao’s classical millionaires’ problem is about securely determining whether x > y, given two input values x, y, which are held as private inputs by two parties, re...
Juan A. Garay, Berry Schoenmakers, José Vil...