Sciweavers

1583 search results - page 48 / 317
» The Quorum Deployment Problem
Sort
View
122
Voted
CSREASAM
2006
15 years 4 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong
119
Voted
SEMWEB
2010
Springer
15 years 15 days ago
Finding the Achilles Heel of the Web of Data: Using Network Analysis for Link-Recommendation
Abstract. The Web of Data is increasingly becoming an important infrastructure for such diverse sectors as entertainment, government, ecommerce and science. As a result, the robust...
Christophe Guéret, Paul T. Groth, Frank van...
CAINE
2009
15 years 14 days ago
Clustering Customer Transactions: A Rough Set Based Approach
An efficient customer behavior analysis is important for good Recommender System. Customer transaction clustering is usually the first step towards the analysis of customer behavi...
Arunava Saha, Darsana Das, Dipanjan Karmakar, Dili...
150
Voted
ICIP
2009
IEEE
15 years 11 days ago
Optimized energy allocation in battery powered image sensor networks
We investigate energy allocation strategies in image sensor networks for the purpose of maximizing the network operational lifetime. For the application scenarios that we consider...
Chao Yu, Gaurav Sharma
PERCOM
2007
ACM
16 years 2 months ago
Static Path Planning for Mobile Beacons to Localize Sensor Networks
In this paper, we study the static path planning problem with wireless sensor network localization as the primary objective. We consider a model in which sensors are assumed to be...
Rui Huang, Gergely V. Záruba