Sciweavers

3652 search results - page 456 / 731
» A study of query length
Sort
View
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
16 years 1 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
ICCAD
2003
IEEE
113views Hardware» more  ICCAD 2003»
16 years 1 months ago
Retiming with Interconnect and Gate Delay
In this paper, we study the problem of retiming of sequential circuits with both interconnect and gate delay. Most retiming algorithms have assumed ideal conditions for the non-lo...
Chris C. N. Chu, Evangeline F. Y. Young, Dennis K....
CHI
2010
ACM
15 years 11 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
ICC
2009
IEEE
168views Communications» more  ICC 2009»
15 years 11 months ago
Optimal Sleep-Wake Policies for an Energy Harvesting Sensor Node
—We study a sensor node with an energy harvesting source. In any slot, the sensor node is in one of two modes: Wake or Sleep. The generated energy is stored in a buffer. The sens...
Vinay Joseph, Vinod Sharma, Utpal Mukherji
ICRA
2009
IEEE
138views Robotics» more  ICRA 2009»
15 years 11 months ago
Dynamically running quadrupeds self-stable region expansion by mechanical design
— Dynamic stability allows running animals to maintain preferred speed during locomotion over rough terrain. It appears that rapid disturbance rejection is an emergent property o...
Panagiotis Chatzakos, Evangelos Papadopoulos