Sciweavers

1522 search results - page 152 / 305
» Requirements analysis for large scale systems
Sort
View
SOCIALCOM
2010
13 years 7 months ago
Traffic in Social Media II: Modeling Bursty Popularity
Online popularity has enormous impact on opinions, culture, policy, and profits, especially with the advent of the social Web and Web advertising. Yet the processes that drive popu...
Jacob Ratkiewicz, Filippo Menczer, Santo Fortunato...
IJSN
2006
124views more  IJSN 2006»
13 years 9 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
SCIA
2009
Springer
261views Image Analysis» more  SCIA 2009»
14 years 1 months ago
Dense and Deformable Motion Segmentation for Wide Baseline Images
In this paper we describe a dense motion segmentation method for wide baseline image pairs. Unlike many previous methods our approach is able to deal with deforming motions and lar...
Juho Kannala, Esa Rahtu, Sami S. Brandt, Janne Hei...
INFOCOM
2011
IEEE
13 years 16 days ago
PVA in VANETs: Stopped cars are not silent
—In Vehicular Ad Hoc Networks (VANETs), the major communication challenge lies in very poor connectivity, which can be caused by sparse or unbalanced traffic. Deploying supporti...
Nianbo Liu, Ming Liu, Wei Lou, Guihai Chen, Jianno...