Sciweavers

12193 search results - page 2410 / 2439
» It's not all about
Sort
View
ICDCS
2010
IEEE
13 years 5 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
ICDM
2010
IEEE
232views Data Mining» more  ICDM 2010»
13 years 5 months ago
gSkeletonClu: Density-Based Network Clustering via Structure-Connected Tree Division or Agglomeration
Community detection is an important task for mining the structure and function of complex networks. Many pervious approaches are difficult to detect communities with arbitrary size...
Heli Sun, Jianbin Huang, Jiawei Han, Hongbo Deng, ...
IJESMA
2010
136views more  IJESMA 2010»
13 years 5 months ago
Understanding Shared Services: An Exploration of the IS Literature
In a competitive environment, companies continuously innovate to offer superior services at lower costs. `Shared services' have been extensively adopted in practice as one me...
Suraya Miskon, Wasana Bandara, Erwin Fielt, Guy G....
ADHOC
2010
317views more  ADHOC 2010»
13 years 4 months ago
Simple ant routing algorithm strategies for a (Multipurpose) MANET model
A Mobile Ad-hoc Network has limited and scarce resources and thus routing protocols in such environments must be kept as simple as possible. The Simple Ant Routing Algorithm (SARA...
Fernando Correia, Teresa Vazão
WISEC
2010
ACM
14 years 17 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
« Prev « First page 2410 / 2439 Last » Next »