Sciweavers

591 search results - page 100 / 119
» Modeling Knowledge Worker Activity
Sort
View
MOBIHOC
2008
ACM
14 years 7 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 2 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
ICPR
2008
IEEE
14 years 2 months ago
A hybrid approach to gender classification from face images
Recently, gender classification from face images has attracted a great deal of attention. It can be useful in many places. In this paper, a novel hybrid face coding method by fusi...
Ziyi Xu, Li Lu, Pengfei Shi
CEC
2007
IEEE
14 years 2 months ago
A comprehensive formal framework for analyzing the behavior of nature-inspired routing protocols
—Nature-inspired routing protocols are becoming an active area of research. Researchers in the community follow a wn engineering philosophy: inspire, abstract, design, develop an...
Saira Zahid, Muhammad Shahzad, Syed Usman Ali, Mud...
ADC
2006
Springer
188views Database» more  ADC 2006»
14 years 1 months ago
Discovering task-oriented usage pattern for web recommendation
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usa...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou