Sciweavers

1737 search results - page 299 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
MOBIHOC
2001
ACM
14 years 9 months ago
Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices
This paper presents 7DS, a novel peer-to-peer data sharing system. 7DS is an architecture, a set of protocols and an implementation enabling the exchange of data among peers that ...
Maria Papadopouli, Henning Schulzrinne
CORR
2012
Springer
250views Education» more  CORR 2012»
12 years 6 months ago
Mining Attribute-structure Correlated Patterns in Large Attributed Graphs
In this work, we study the correlation between attribute sets and the occurrence of dense subgraphs in large attributed graphs, a task we call structural correlation pattern minin...
Arlei Silva, Wagner Meira Jr., Mohammed J. Zaki
FGR
2008
IEEE
195views Biometrics» more  FGR 2008»
14 years 4 months ago
Regularized active shape model for shape alignment
Active shape model (ASM) statistically represents a shape by a set of well-defined landmark points and models object variations using principal component analysis (PCA). However, ...
Ran He, Zhen Lei, Xiaotong Yuan, Stan Z. Li
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
14 years 3 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
CLEF
2008
Springer
14 years 1 days ago
UniNE at Domain-Specific IR - CLEF 2008
Our first objective in participating in this domain-specific evaluation campaign is to propose and evaluate various indexing and search strategies for the German, English and Russ...
Claire Fautsch, Ljiljana Dolamic, Jacques Savoy