Sciweavers

5255 search results - page 966 / 1051
» Formal Methods for Privacy
Sort
View
PAMI
2006
128views more  PAMI 2006»
13 years 10 months ago
On Weighting Clustering
Recent papers and patents in iterative unsupervised learning have emphasized a new trend in clustering. It basically consists of penalizing solutions via weights on the instance po...
Richard Nock, Frank Nielsen
SOCO
2008
Springer
13 years 10 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
TMI
2008
138views more  TMI 2008»
13 years 10 months ago
Accurate Event-Driven Motion Compensation in High-Resolution PET Incorporating Scattered and Random Events
With continuing improvements in spatial resolution of positron emission tomography (PET) scanners, small patient movements during PET imaging become a significant source of resolut...
Arman Rahmim, Katie Dinelle, Ju-Chieh Cheng, Mikha...
TOCS
2008
107views more  TOCS 2008»
13 years 10 months ago
RaWMS - Random Walk Based Lightweight Membership Service for Wireless Ad Hoc Networks
RaWMS is a novel lightweight random membership service for ad hoc networks. The service provides each node with a partial uniformly chosen view of network nodes. Such a membership...
Ziv Bar-Yossef, Roy Friedman, Gabriel Kliot
JCS
2007
84views more  JCS 2007»
13 years 10 months ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu