Sciweavers

4266 search results - page 751 / 854
» The container loading problem
Sort
View
DASFAA
2008
IEEE
188views Database» more  DASFAA 2008»
14 years 2 months ago
Summarization Graph Indexing: Beyond Frequent Structure-Based Approach
Graph is an important data structure to model complex structural data, such as chemical compounds, proteins, and XML documents. Among many graph data-based applications, sub-graph ...
Lei Zou, Lei Chen 0002, Huaming Zhang, Yansheng Lu...
INFOCOM
2008
IEEE
14 years 2 months ago
Robust Planarization of Unlocalized Wireless Sensor Networks
Abstract—Wireless sensor networks need very efficient network protocols due to the sensors’ limited communication and computation capabilities. Network planarization – find...
Fenghui Zhang, Anxiao Jiang, Jianer Chen
WACV
2008
IEEE
14 years 2 months ago
Localization and Segmentation of A 2D High Capacity Color Barcode
A 2D color barcode can hold much more information than a binary barcode. Barcodes are often intended for consumer use, such as, a consumer can take an image with her cellphone cam...
Devi Parikh, Gavin Jancke
ICC
2007
IEEE
110views Communications» more  ICC 2007»
14 years 2 months ago
Distributed Early Worm Detection Based on Payload Histograms
— Epidemic worms has become a social problem owing to their potency in paralyzing the Internet, thus affecting our way of life. Recent researches have pointed out that epidemic w...
Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirw...
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 2 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough