Sciweavers

961 search results - page 128 / 193
» Visual Cryptography on Graphs
Sort
View
INFOVIS
2003
IEEE
14 years 1 months ago
Visualizing Evolving Networks: Minimum Spanning Trees versus Pathfinder Networks
Network evolution is a ubiquitous phenomenon in a wide variety of complex systems. There is an increasing interest in statistically modeling the evolution of complex networks such...
Chaomei Chen, Steven Morris
SDM
2004
SIAM
165views Data Mining» more  SDM 2004»
13 years 9 months ago
Visualizing RFM Segmentation
Segmentation based on RFM (Recency, Frequency, and Monetary) has been used for over 50 years by direct marketers to target a subset of their customers, save mailing costs, and imp...
Ron Kohavi, Rajesh Parekh
SASN
2004
ACM
14 years 1 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
EUROCRYPT
2008
Springer
13 years 10 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
VIS
2005
IEEE
204views Visualization» more  VIS 2005»
14 years 9 months ago
Differential Protein Expression Analysis via Liquid-Chromatography/Mass-Spectrometry Data Visualization
Differential protein expression analysis is one of the main challenges in proteomics. It denotes the search for proteins, whose encoding genes are differentially expressed under a...
Lars Linsen, Julia Löcherbach, Matthias Berth...