Sciweavers

64 search results - page 3 / 13
» isi 2008
Sort
View
ISI
2008
Springer
13 years 7 months ago
Secure remote control model for information appliances
Abstract--Recently, Lee et al. proposed a Remote Authentication Model of Information Appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network o...
Wen-Gong Shieh, Jian-Min Wang, Wen-Bing Horng
ISI
2008
Springer
13 years 7 months ago
Summary management in unstructured P2P systems
In this paper, we propose managing data summaries in unstructured P2P systems. Our summaries are intelligible views with two main virtues. First, they can be directly queried and u...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...
ISI
2008
Springer
13 years 6 months ago
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
We discuss how methods from social network analysis could be combined with methodologies from database mediator technology and information fusion in order to give police and other ...
Luigi Ferrara, Christian Mårtenson, Pontus S...
VTC
2008
IEEE
122views Communications» more  VTC 2008»
14 years 1 months ago
BER Performance of Joint THP/pre-FDE
—Recently, frequency-domain equalization (FDE) based on the minimum mean square error (MMSE) criterion has been attracting much attention to overcome the frequency-selective fadi...
Kazuki Takeda, Hiromichi Tomeba, Fumiyuki Adachi
ISI
2008
Springer
13 years 7 months ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen