Sciweavers

5752 search results - page 1125 / 1151
» Informative Labeling Schemes
Sort
View
ICDCS
2010
IEEE
14 years 17 days ago
Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks
—This research focuses on distributed and localized algorithms for precise boundary detection in 3D wireless networks. Our objectives are in two folds. First, we aim to identify ...
Hongyu Zhou, Su Xia, Miao Jin, Hongyi Wu
COLCOM
2009
IEEE
14 years 15 days ago
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms o...
Mahendra Kumar, Richard E. Newman, José For...
ASPLOS
2006
ACM
14 years 12 days ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
CCS
2006
ACM
14 years 12 days ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
GFKL
2006
Springer
133views Data Mining» more  GFKL 2006»
14 years 10 days ago
Adaptive Conjoint Analysis for Pricing Music Downloads
Finding the right pricing for music downloads is of ample importance to the recording industry and music download service providers. For the recently introduced music downloads, re...
Christoph Breidert, Michael Hahsler
« Prev « First page 1125 / 1151 Last » Next »