Sciweavers

9503 search results - page 1897 / 1901
» Authenticated System Calls
Sort
View
INFOCOM
2012
IEEE
11 years 11 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...
TOG
2012
258views Communications» more  TOG 2012»
11 years 11 months ago
Stitch meshes for modeling knitted clothing with yarn-level detail
ike abstraction of the yarn model; (c) then, we specify the desired knitting pattern over the stitch mesh’s surface. (d) Following the interactive modeling process, the model goe...
Cem Yuksel, Jonathan M. Kaldor, Doug L. James, Ste...
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
11 years 11 months ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...
KDD
2012
ACM
202views Data Mining» more  KDD 2012»
11 years 11 months ago
UFIMT: an uncertain frequent itemset mining toolbox
In recent years, mining frequent itemsets over uncertain data has attracted much attention in the data mining community. Unlike the corresponding problem in deterministic data, th...
Yongxin Tong, Lei Chen 0002, Philip S. Yu
SIGIR
2012
ACM
11 years 11 months ago
Explanatory semantic relatedness and explicit spatialization for exploratory search
Exploratory search, in which a user investigates complex concepts, is cumbersome with today’s search engines. We present a new exploratory search approach that generates interac...
Brent Hecht, Samuel Carton, Mahmood Quaderi, Johan...
« Prev « First page 1897 / 1901 Last » Next »