Sciweavers

13706 search results - page 2737 / 2742
» Information Problems in Information Society
Sort
View
ICC
2011
IEEE
239views Communications» more  ICC 2011»
12 years 6 months ago
The Insights of DV-Based Localization Algorithms in the Wireless Sensor Networks with Duty-Cycled and Radio Irregular Sensors
—Location information of nodes is the basis for many applications in wireless sensor networks (WSNs). However, most previous localization methods make the unrealistic assumption:...
Yuanfang Chen, Lei Shu, Mingchu Li, Ziqi Fan, Lei ...
WSDM
2012
ACM
254views Data Mining» more  WSDM 2012»
12 years 2 months ago
Maximizing product adoption in social networks
One of the key objectives of viral marketing is to identify a small set of users in a social network, who when convinced to adopt a product will influence others in the network l...
Smriti Bhagat, Amit Goyal 0002, Laks V. S. Lakshma...
ICDE
2012
IEEE
269views Database» more  ICDE 2012»
11 years 9 months ago
A Deep Embedding of Queries into Ruby
—We demonstrate SWITCH, a deep embedding of relational queries into RUBY and RUBY on RAILS. With SWITCH, there is no syntactic or stylistic difference between RUBY programs that ...
Torsten Grust, Manuel Mayr
TOG
2012
209views Communications» more  TOG 2012»
11 years 9 months ago
Animating bubble interactions in a liquid foam
Bubbles and foams are important features of liquid surface phenomena, but they are difficult to animate due to their thin films and complex interactions in the real world. In par...
Oleksiy Busaryev, Tamal K. Dey, Huamin Wang, Zhong...
ISSTA
2012
ACM
11 years 9 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
« Prev « First page 2737 / 2742 Last » Next »