Sciweavers

174 search results - page 14 / 35
» Practically Perfect
Sort
View
ERCIMDL
2009
Springer
153views Education» more  ERCIMDL 2009»
14 years 3 months ago
SyGAR - A Synthetic Data Generator for Evaluating Name Disambiguation Methods
Name ambiguity in the context of bibliographic citations is one of the hardest problems currently faced by the digital library community. Several methods have been proposed in the ...
Anderson A. Ferreira, Marcos André Gon&cced...
WOWMOM
2009
ACM
143views Multimedia» more  WOWMOM 2009»
14 years 3 months ago
Enhanced Ripple (E-Ripple) protocol for chain-based multihop wireless networks
It has been shown that IEEE 802.11 DCF medium access control (MAC) protocol may not be suitable for multihop wireless networks due to its relatively low throughput and severely un...
Quang Vu Nguyen, Ray-Guang Cheng
IH
2007
Springer
14 years 2 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
IPSN
2007
Springer
14 years 2 months ago
Blind calibration of sensor networks
This paper considers the problem of blindly calibrating sensor response using routine sensor network measurements. We show that as long as the sensors slightly oversample the sign...
Laura Balzano, Robert Nowak
RE
2007
Springer
14 years 2 months ago
Choosing a Tram Route: An Experience in Trading-Off Constraints
Trading-off is a familiar element in requirements practice, but it generally assumes a set of independent requirements competing for resources. Choosing a tram route depends inste...
Ian Alexander