Sciweavers

6884 search results - page 114 / 1377
» The macro-structure of use of help
Sort
View
NETWORKING
2007
13 years 10 months ago
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
Abstract. Many techniques have been developed recently for establishing pairwise keys in sensor networks. However, they are either vulnerable to a few number of compromised sensor ...
Qi Dong, Donggang Liu
IASTEDSEA
2004
13 years 10 months ago
Towards flexible software processes by using process patterns
Process patterns allow the modular modelling and adaptable application of software processes. Present descriptions of process patterns show defects like non-uniform and unequivoca...
Mariele Hagen, Volker Gruhn
IM
2003
13 years 10 months ago
Using Neural Networks to Identify Control and Management Plane Poison Messages
: Poison message failure propagation is a mechanism that has been responsible for large scale failures in both telecommunications and IP networks: Some or all of the network elemen...
Xiaojiang Du, Mark A. Shayman, Ronald A. Skoog
SDM
2003
SIAM
156views Data Mining» more  SDM 2003»
13 years 10 months ago
Detection of Underrepresented Biological Sequences using Class-Conditional Distribution Models
A labeled sequence data set related to a certain biological property is often biased and, therefore, does not completely capture its diversity in nature. To reduce this sampling b...
Slobodan Vucetic, Dragoljub Pokrajac, Hongbo Xie, ...
VISSYM
2003
13 years 10 months ago
Hardware-assisted View-dependent Isosurface Extraction using Spherical Partition
Extracting only the visible portion of an isosurface can improve both the computation efficiency and the rendering speed. However, the visibility test overhead can be quite high ...
Jinzhu Gao, Han-Wei Shen