Sciweavers

2446 search results - page 164 / 490
» Polyadic Concept Analysis
Sort
View
ICPPW
2003
IEEE
14 years 3 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
HUMAN
2003
Springer
14 years 3 months ago
Analysis of User Utility Function in the Combined Cellular/WLAN Environments
Recent advances in wireless networking technologies enabled nomadic users connected to the Internet anywhere from the outdoor environments such as airport, hotel, subway station, o...
Jae-Hwan Kim, Young Yong Kim
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
14 years 2 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
CIKM
1997
Springer
14 years 2 months ago
The Need for Metrics in Visual Information Analysis
CT This paper explores several methods for visualizing the thematic content of large document collections. As opposed to traditional query-driven document retrieval, these methods ...
Nancy Miller, Elizabeth G. Hetzler, Grant Nakamura...
SIGCOMM
1994
ACM
14 years 2 months ago
Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines
This paper discusses congestion control from a game-theoretic perspective. There are two basic premises: (1) users are assumed to be independent and sel sh, and (2) central admini...
Scott Shenker