Sciweavers

1852 search results - page 300 / 371
» Block-level link analysis
Sort
View
ISI
2008
Springer
13 years 7 months ago
Using "Cited by" Information to Find the Context of Research Papers
This paper proposes a novel method of analyzing data to find important information about the context of research papers. The proposed CCTVA (Collecting, Cleaning, Translating, Visu...
Chun-Hung Lu, Chih-Chien Wang, Min-Yuh Day, Chorng...
JCM
2008
81views more  JCM 2008»
13 years 7 months ago
Power Allocation for Amplify-and-Forward Cooperative Transmission Over Rayleigh-Fading Channels
Cooperative transmission has been used to achieve diversity gain through partner to create multiple independent fading channels. It has attracted lots of research attention in rece...
Lian Zhao, Zaiyi Liao
ISI
2006
Springer
13 years 7 months ago
Suspect Vehicle Identification for Border Safety with Modified Mutual Information
The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. ...
Siddharth Kaza, Yuan Wang, Hsinchun Chen
JNW
2008
99views more  JNW 2008»
13 years 7 months ago
Probabilistic Key Management Practical Concerns in Wireless Sensor Networks
The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made...
Rui Miguel Soares Silva, Nuno Sidónio A. Pe...
DEBU
2007
131views more  DEBU 2007»
13 years 7 months ago
Future Trends in Secure Chip Data Management
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be care...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral