Sciweavers

565 search results - page 54 / 113
» A logic for authorization provenance
Sort
View
NETWORK
2006
302views more  NETWORK 2006»
13 years 8 months ago
Node clustering in wireless sensor networks: recent developments and deployment challenges
The large-scale deployment of wireless sensor networks (WSNs) and the need for data aggregation necessitate efficient organization of the network topology for the purpose of balan...
Ossama Younis, Marwan Krunz, Srinivasan Ramasubram...
JALC
2007
109views more  JALC 2007»
13 years 8 months ago
A Family of NFAs Free of State Reductions
Merging states in finite automata is a main method of reducing the size of the representation of regular languages. The process has been extensively studied for deterministic fi...
Cezar Câmpeanu, Nicolae Santean, Sheng Yu
EUROMED
2010
13 years 6 months ago
Hyperspectral Ground Truth Data for the Detection of Buried Architectural Remains
The aim of the study is to validate hyperspectral ground data for the detection of buried architectural remains. For this reason spectro-radiometric measurements were taken from an...
Athos Agapiou, Diofantos G. Hadjimitsis, Apostolos...
WIKIS
2010
ACM
13 years 6 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
CSCW
2011
ACM
13 years 3 months ago
Virtual gifts and guanxi: supporting social exchange in a chinese online community
Significant cultural differences persist between East and West. Software systems that have been proven to operate efficiently within one culture can fail in the context of the oth...
Jiang Yang, Mark S. Ackerman, Lada A. Adamic