Sciweavers

2347 search results - page 402 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
IPSN
2005
Springer
14 years 1 months ago
Lossy network correlated data gathering with high-resolution coding
— We consider a sensor network measuring correlated data, where the task is to gather all data from the network nodes to a sink. We consider the case where data at nodes is lossy...
Razvan Cristescu, Baltasar Beferull-Lozano
IPTPS
2005
Springer
14 years 1 months ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...
ISMIS
2005
Springer
14 years 1 months ago
Statistical Database Modeling for Privacy Preserving Database Generation
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Xintao Wu, Yongge Wang, Yuliang Zheng
KES
2005
Springer
14 years 1 months ago
Optimal Remediation Design in Groundwater Systems by Intelligent Techniques
Abstract. This research develops an optimal planning model for pump-treatinject based groundwater remediation systems. Optimizing the design of the pump-treat-inject system is a no...
Hone-Jay Chu, Chin-Tsai Hsiao, Liang-Cheng Chang
MICCAI
2005
Springer
14 years 1 months ago
Characterizing Vascular Connectivity from microCT Images
Abstract. X-ray microCT (computed tomography) has become a valuable tool in the analysis of vascular architecture in small animals. Because of its high resolution, a detailed asses...
Marcel Jackowski, Xenophon Papademetris, Lawrence ...