Sciweavers

2907 search results - page 65 / 582
» Trust analysis with clustering
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
13 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
JIPS
2007
103views more  JIPS 2007»
13 years 10 months ago
Feature Extraction of Concepts by Independent Component Analysis
: Semantic clustering is important to various fields in the modern information society. In this work we applied the Independent Component Analysis method to the extraction of the f...
Altangerel Chagnaa, Cheolyoung Ock, Chang Beom Lee...
ICIW
2007
IEEE
13 years 10 months ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...
CSDA
2010
105views more  CSDA 2010»
13 years 10 months ago
James-Stein shrinkage to improve k-means cluster analysis
We study a general algorithm to improve accuracy in cluster analysis that employs the James-Stein shrinkage effect in k-means clustering. We shrink the centroids of clusters towar...
Jinxin Gao, David B. Hitchcock
MM
2005
ACM
154views Multimedia» more  MM 2005»
14 years 3 months ago
Determining structure in continuously recorded videos
In this paper, we present a scene detection framework on continuously recorded videos. Conventional temporal scene segmentation methods work for the videos composed of discrete sh...
Yun Zhai, Mubarak Shah