Sciweavers

852 search results - page 125 / 171
» Knowledge Base Population: Successful Approaches and Challen...
Sort
View
ESORICS
2004
Springer
14 years 1 months ago
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
Seyit Ahmet Çamtepe, Bülent Yener
CEC
2010
IEEE
13 years 8 months ago
Multi-objective mobile agent-based Sensor Network Routing using MOEA/D
Abstract— Mobile agents are often used in wireless sensor networks for distributed target detection with the goal of minimizing the transmission of non-critical data that negativ...
Andreas Konstantinidis 0002, Christoforos Charalam...
IJCV
2000
121views more  IJCV 2000»
13 years 8 months ago
Regularized Bundle-Adjustment to Model Heads from Image Sequences without Calibration Data
We address the structure-from-motionproblem in the context of head modeling from video sequences for which calibration data is not available. This task is made challenging by the ...
Pascal Fua
CIDR
2007
144views Algorithms» more  CIDR 2007»
13 years 10 months ago
Cache-Oblivious Query Processing
We propose a radical approach to relational query processing that aims at automatically and consistently achieving a good performance on any memory hierarchy. We believe this auto...
Bingsheng He, Qiong Luo
ISSA
2004
13 years 10 months ago
On Privacy And The Web
Chor et al [3] show that when accessing a single public database, a user is only guaranteed safety from an administrator inferring the user's real intentions (an inference at...
Wesley Brandi