Sciweavers

350 search results - page 24 / 70
» What's in a Name
Sort
View
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 4 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis
CEC
2007
IEEE
14 years 4 months ago
An investigation of hyper-heuristic search spaces
— Hyper-heuristics or “heuristics that coordinate heuristics” are fastly becoming popular for solving combinatorial optimisation problems. These methods do not search directl...
José Antonio Vázquez Rodrígue...
ECUMN
2007
Springer
14 years 4 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...
FSKD
2007
Springer
126views Fuzzy Logic» more  FSKD 2007»
14 years 4 months ago
Rough Set Model Selection for Practical Decision Making
One of the challenges a decision maker faces is choosing a suitable rough set model to use for data analysis. The traditional algebraic rough set model classifies objects into th...
Joseph P. Herbert, Jingtao Yao
ICTAI
2006
IEEE
14 years 3 months ago
Hierarchical Language Models for Expert Finding in Enterprise Corpora
Enterprise corpora contain evidence of what employees work on and therefore can be used to automatically find experts on a given topic. We present a general approach for represen...
Desislava Petkova, W. Bruce Croft