Sciweavers

1209 search results - page 91 / 242
» Approximation by pseudo-linear operators
Sort
View
TDSC
2011
14 years 11 months ago
An Obfuscation-Based Approach for Protecting Location Privacy
—The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the phys...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
ICDE
2011
IEEE
207views Database» more  ICDE 2011»
14 years 8 months ago
Monte Carlo query processing of uncertain multidimensional array data
— Array database systems are architected for scientific and engineering applications. In these applications, the value of a cell is often imprecise and uncertain. There are at le...
Tingjian Ge, David Grabiner, Stanley B. Zdonik
STOC
2005
ACM
184views Algorithms» more  STOC 2005»
15 years 10 months ago
Coresets in dynamic geometric data streams
A dynamic geometric data stream consists of a sequence of m insert/delete operations of points from the discrete space {1, . . . , ∆}d [26]. We develop streaming (1 + )-approxim...
Gereon Frahling, Christian Sohler
DIALM
2003
ACM
113views Algorithms» more  DIALM 2003»
15 years 9 months ago
Multicast time maximization in energy constrained wireless networks
We consider the problem of maximizing the lifetime of a given multicast connection in a wireless network of energyconstrained (e.g. battery-operated) nodes, by choosing ideal tran...
Patrik Floréen, Petteri Kaski, Jukka Kohone...
ICRA
2002
IEEE
187views Robotics» more  ICRA 2002»
15 years 9 months ago
Trajectory Planning using Reachable-State Density Functions
:This paper presents a trajectory planning algorithm for mobile robots which may be subject to kinodynamic constraints. Using computational methods from noncommutative harmonic ana...
Richard Mason, Joel W. Burdick