Sciweavers

2599 search results - page 514 / 520
» An Operational Semantics for Knowledge Bases
Sort
View
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
14 years 25 days ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
KR
2004
Springer
14 years 23 days ago
Advanced Research with Autonomous Unmanned Aerial Vehicles
Abstract The emerging area of intelligent unmanned aerial vehicle (UAV) research has shown rapid development in recent years and offers a great number of research challenges for ar...
Patrick Doherty
ICDM
2003
IEEE
92views Data Mining» more  ICDM 2003»
14 years 21 days ago
Validating and Refining Clusters via Visual Rendering
Clustering is an important technique for understanding and analysis of large multi-dimensional datasets in many scientific applications. Most of clustering research to date has be...
Keke Chen, Ling Liu
INFOCOM
2003
IEEE
14 years 21 days ago
Flow Level Simulation of Large IP Networks
— The aim of this paper is to simulate the interaction of a large number of TCP controlled flows and UDP flows sharing many routers/links, from the knowledge of the network par...
François Baccelli, Dohy Hong
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 20 days ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...