Sciweavers

2606 search results - page 381 / 522
» cost 2008
Sort
View
ICDCS
2008
IEEE
14 years 4 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
ICDE
2008
IEEE
117views Database» more  ICDE 2008»
14 years 4 months ago
Region Sampling: Continuous Adaptive Sampling on Sensor Networks
Abstract— Satisfying energy constraints while meeting performance requirements is a primary concern when a sensor network is being deployed. Many recent proposed techniques offer...
Song Lin, Benjamin Arai, Dimitrios Gunopulos, Gaut...
ICDE
2008
IEEE
189views Database» more  ICDE 2008»
14 years 4 months ago
Adapting ranking functions to user preference
— Learning to rank has become a popular method for web search ranking. Traditionally, expert-judged examples are the major training resource for machine learned web ranking, whic...
Keke Chen, Ya Zhang, Zhaohui Zheng, Hongyuan Zha, ...
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 4 months ago
Skyline-join in distributed databases
— The database research community has recently recognized the usefulness of skyline query. As an extension of existing database operator, the skyline query is valuable for multi-...
Dalie Sun, Sai Wu, Jianzhong Li, Anthony K. H. Tun...
ICDM
2008
IEEE
185views Data Mining» more  ICDM 2008»
14 years 4 months ago
Clustering Uncertain Data Using Voronoi Diagrams
We study the problem of clustering uncertain objects whose locations are described by probability density functions (pdf). We show that the UK-means algorithm, which generalises t...
Ben Kao, Sau Dan Lee, David W. Cheung, Wai-Shing H...