Sciweavers

4757 search results - page 930 / 952
» A Unique
Sort
View
WWW
2011
ACM
14 years 11 months ago
Finding the bias and prestige of nodes in networks based on trust scores
Many real-life graphs such as social networks and peer-topeer networks capture the relationships among the nodes by using trust scores to label the edges. Important usage of such ...
Abhinav Mishra, Arnab Bhattacharya
EJWCN
2010
118views more  EJWCN 2010»
14 years 10 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
194
Voted
IGARSS
2010
14 years 10 months ago
Enhanced Cloud algorithm from collocated CALIPSO, CloudSat and MODIS global boundary layer lapse rate studies
Coincident profile information from CALIPSO's lidar and CloudSat's radar offers a unique opportunity to map the vertical structure of clouds over the globe with accuraci...
Sunny Sun-Mack, Patrick Minnis, Seiji Kato, Yan Ch...
IJAHUC
2010
145views more  IJAHUC 2010»
14 years 10 months ago
Towards a routing framework in ad hoc space networks
Abstract: The unique characteristics of space networks lead to different research approaches from those in terrestrial networks. In this paper, a routing framework called Space Gat...
Chao Chen, Zesheng Chen
JACM
2010
120views more  JACM 2010»
14 years 10 months ago
The structure of inverses in schema mappings
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Alan Nash