Sciweavers

1594 search results - page 265 / 319
» An Algorithm to Compute Collusion Paths
Sort
View
127
Voted
GIS
2002
ACM
15 years 2 months ago
A road network embedding technique for k-nearest neighbor search in moving object databases
A very important class of queries in GIS applications is the class of K-Nearest Neighbor queries. Most of the current studies on the K-Nearest Neighbor queries utilize spatial ind...
Cyrus Shahabi, Mohammad R. Kolahdouzan, Mehdi Shar...
102
Voted
EUROGRAPHICS
2010
Eurographics
15 years 11 months ago
Uncertain 2D Vector Field Topology
We introduce an approach to visualize stationary 2D vector fields with global uncertainty obtained by considering the transport of local uncertainty in the flow. For this, we ex...
Mathias Otto, Tobias Germer, Hans-Christian Hege, ...
106
Voted
ICDCS
2007
IEEE
15 years 9 months ago
Temporal Privacy in Wireless Sensor Networks
Although the content of sensor messages describing “events of interest” may be encrypted to provide confidentiality, the context surrounding these events may also be sensitiv...
Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong ...
115
Voted
HPCC
2007
Springer
15 years 8 months ago
Multi-domain Topology-Aware Grouping for Application-Layer Multicast
Application-layer multicast (ALM) can solve most of the problems of IP-based multicast. Topology-aware approach of ALM is more attractive because it exploits underlying network top...
Jianqun Cui, Yanxiang He, Libing Wu, Naixue Xiong,...
97
Voted
INFOCOM
2005
IEEE
15 years 8 months ago
On static reachability analysis of IP networks
The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provide...
Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Z...