Sciweavers

2028 search results - page 30 / 406
» Deriving Relation Keys from XML Keys
Sort
View
121
Voted
SAMOS
2010
Springer
15 years 2 months ago
Identifying communication models in Process Networks derived from Weakly Dynamic Programs
—Process Networks (PNs) is an appealing computation ion helping to specify an application in parallel form and realize it on parallel platforms. The key questions to be answered ...
Dmitry Nadezhkin, Todor Stefanov
130
Voted
MSN
2005
Springer
15 years 9 months ago
Using MDS Codes for the Key Establishment of Wireless Sensor Networks
Key pre-distribution techniques for security provision of Wireless Sensor Networks (WSNs) have attracted significant interests recently. In these schemes, a relatively small numbe...
Jing Deng, Yunghsiang S. Han
112
Voted
ECIS
2004
15 years 5 months ago
Deriving business value from IT: converting IT expenditures into assets with desired impacts
The research reported in this paper examines how business value is being created and delivered by IT in large private organisations in Australia. The critical organisational gover...
Judy McKay, Peter Marshall
110
Voted
KDD
2006
ACM
163views Data Mining» more  KDD 2006»
16 years 4 months ago
New EM derived from Kullback-Leibler divergence
We introduce a new EM framework in which it is possible not only to optimize the model parameters but also the number of model components. A key feature of our approach is that we...
Longin Jan Latecki, Marc Sobel, Rolf Lakämper
143
Voted
IJSNET
2008
118views more  IJSNET 2008»
15 years 3 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...