Sciweavers

3926 search results - page 676 / 786
» Deriving Information Requirements from Responsibility Models
Sort
View
ADHOC
2008
95views more  ADHOC 2008»
15 years 4 months ago
The polarized gossip protocol for path discovery in MANETs
In this paper we present a novel probabilistic protocol for path discovery in Mobile Ad Hoc Networks (MANETs). The protocol implements what we call a polarized gossiping algorithm...
Roberto Beraldi
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
15 years 10 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...
EUROCRYPT
2005
Springer
15 years 10 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
BMCBI
2008
163views more  BMCBI 2008»
15 years 4 months ago
Nuclear staining and relative distance for quantifying epidermal differentiation in biomarker expression profiling
Background: The epidermal physiology results from a complex regulated homeostasis of keratinocyte proliferation, differentiation and death and is tightly regulated by a specific p...
Thora Pommerencke, Thorsten Steinberg, Hartmut Dic...
212
Voted
SIGMOD
2008
ACM
138views Database» more  SIGMOD 2008»
16 years 4 months ago
Sampling time-based sliding windows in bounded space
Random sampling is an appealing approach to build synopses of large data streams because random samples can be used for a broad spectrum of analytical tasks. Users are often inter...
Rainer Gemulla, Wolfgang Lehner