Sciweavers

762 search results - page 59 / 153
» Finding SHA-1 Characteristics: General Results and Applicati...
Sort
View
NOSSDAV
2005
Springer
14 years 2 months ago
The case for multi-tier camera sensor networks
In this position paper, we examine recent technology trends that have resulted in a broad spectrum of camera sensors, wireless radio technologies, and embedded sensor platforms wi...
Purushottam Kulkarni, Deepak Ganesan, Prashant J. ...
WWW
2008
ACM
14 years 9 months ago
Yes, there is a correlation: - from social networks to personal behavior on the web
Characterizing the relationship that exists between a person's social group and his/her personal behavior has been a long standing goal of social network analysts. In this pa...
Parag Singla, Matthew Richardson
ICTAC
2010
Springer
13 years 7 months ago
Formal Modelling of Separation Kernel Components
Abstract. Separation kernels are key components in embedded applications. Their small size and widespread use in high-integrity environments make them good targets for formal model...
Andrius Velykis, Leo Freitas
KDD
2006
ACM
143views Data Mining» more  KDD 2006»
14 years 9 months ago
Algorithms for discovering bucket orders from data
Ordering and ranking items of different types are important tasks in various applications, such as query processing and scientific data mining. A total order for the items can be ...
Aristides Gionis, Heikki Mannila, Kai Puolamä...
KDD
2005
ACM
89views Data Mining» more  KDD 2005»
14 years 9 months ago
Mining risk patterns in medical data
In this paper, we discuss a problem of finding risk patterns in medical data. We define risk patterns by a statistical metric, relative risk, which has been widely used in epidemi...
Jiuyong Li, Ada Wai-Chee Fu, Hongxing He, Jie Chen...