Sciweavers

2907 search results - page 62 / 582
» Trust analysis with clustering
Sort
View
VLSID
2004
IEEE
107views VLSI» more  VLSID 2004»
14 years 10 months ago
Performance Analysis of Inter Cluster Communication Methods in VLIW Architecture
With increasing demands for high performance by embedded systems, especially by digital signal processing applications, embedded processors must increase available instruction lev...
Sourabh Saluja, Anshul Kumar
PRL
2010
188views more  PRL 2010»
13 years 5 months ago
A fast divisive clustering algorithm using an improved discrete particle swarm optimizer
As an important technique for data analysis, clustering has been employed in many applications such as image segmentation, document clustering and vector quantization. Divisive cl...
Liang Feng, Ming-Hui Qiu, Yu-Xuan Wang, Qiao-Liang...
WIMOB
2007
IEEE
14 years 4 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
IJNSEC
2008
190views more  IJNSEC 2008»
13 years 10 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
DATESO
2007
85views Database» more  DATESO 2007»
13 years 11 months ago
Improvement of Text Compression Parameters Using Cluster Analysis
Abstract. Several actions are usually performed when document is appended to textual database in information retrieval system. The most frequent actions are compression of the docu...
Jiri Dvorský, Jan Martinovic