Sciweavers

229 search results - page 36 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Double Mobility: Coverage of the Sea Surface with Mobile Sensor Networks
Abstract—We are interested in the sensor networks for scientific applications to cover and measure statistics on the sea surface. Due to flows and waves, the sensor nodes may g...
Ji Luo, Dan Wang, Qian Zhang
BMCBI
2008
104views more  BMCBI 2008»
13 years 7 months ago
ReRep: Computational detection of repetitive sequences in genome survey sequences (GSS)
Background: Genome survey sequences (GSS) offer a preliminary global view of a genome since, unlike ESTs, they cover coding as well as non-coding DNA and include repetitive region...
Thomas D. Otto, Leonardo H. F. Gomes, Marcelo Alve...
VLDB
2007
ACM
187views Database» more  VLDB 2007»
14 years 8 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion
SOUPS
2010
ACM
13 years 7 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
ICIP
2007
IEEE
14 years 2 months ago
Face Recognition using a Fast Model Synthesis from a Profile and a Frontal View
In our previous work we presented a new 2D-3D mixed face recognition scheme called Partial Principal Component Analysis (P2 CA) [1]. The main contribution of P2 CA is that it uses...
Antonio Rama, Francesc Tarres