Sciweavers

629 search results - page 125 / 126
» The Effects of Time and Personality on the Productivity of M...
Sort
View
MOBIHOC
2007
ACM
14 years 7 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
KDD
2009
ACM
152views Data Mining» more  KDD 2009»
14 years 8 months ago
TANGENT: a novel, 'Surprise me', recommendation algorithm
Most of recommender systems try to find items that are most relevant to the older choices of a given user. Here we focus on the "surprise me" query: A user may be bored ...
Kensuke Onuma, Hanghang Tong, Christos Faloutsos
ACISICIS
2009
IEEE
13 years 11 months ago
A Novel Approach Based on PCNNs Template for Fingerprint Image Thinning
A PCNNs-based square-and-triangle-template method for binary fingerprint image thinning is proposed. The algorithm is iterative, in which a combined sequential and parallel proces...
Dacheng Xu, Bailiang Li, Anton Nijholt
ISSRE
2010
IEEE
13 years 6 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
DFG
2007
Springer
14 years 1 months ago
PointCloudXplore 2: Visual Exploration of 3D Gene Expression
: To better understand how developmental regulatory networks are defined in the genome sequence, the Berkeley Drosophila Transcription Network Project (BDNTP) has developed a suit...
Oliver Rübel, Gunther H. Weber, Min-Yu Huang,...