Sciweavers

280 search results - page 36 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
SUTC
2006
IEEE
14 years 1 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
IPPS
2008
IEEE
14 years 2 months ago
Parallel mining of closed quasi-cliques
Graph structure can model the relationships among a set of objects. Mining quasi-clique patterns from large dense graph data makes sense with respect to both statistic and applica...
Yuzhou Zhang, Jianyong Wang, Zhiping Zeng, Lizhu Z...
CSCWD
2008
Springer
13 years 9 months ago
Running smart process based on goals
When web services are used to coalesce around the distributed applications, one prominent solution to manage and coordinate web services is the use of process management. Many res...
Zongmin Shang, Haiyang Wang, Liqiang Wang, Hui Li,...
CVPR
2010
IEEE
13 years 7 months ago
Scene understanding by statistical modeling of motion patterns
We present a novel method for the discovery and statistical representation of motion patterns in a scene observed by a static camera. Related methods involving learning of pattern...
Imran Saleemi, Lance Hartung, Mubarak Shah
ICC
2009
IEEE
190views Communications» more  ICC 2009»
14 years 2 months ago
Decomposition for Low-Complexity Near-Optimal Routing in Multi-Hop Wireless Networks
Abstract—Network flow models serve as a popular mathematical framework for the analysis and optimization of Multi-hop Wireless Networks. They also serve to provide the understan...
Vinay Kolar, Nael B. Abu-Ghazaleh, Petri Mäh&...