Sciweavers

7066 search results - page 1305 / 1414
» Contact Relations with Applications
Sort
View
MOBIHOC
2004
ACM
14 years 3 months ago
On the behavior of communication links of a node in a multi-hop mobile environment
In this work, we develop an analytical framework to investigate the behavior of the communication links of a node in a random mobility environment. Analytical expressions characte...
Prince Samar, Stephen B. Wicker
NPAR
2004
ACM
14 years 3 months ago
Hardware-determined feature edges
Algorithms that detect silhouettes, creases, and other edge based features often perform per-edge and per-face mesh computations using global adjacency information. These are unsu...
Morgan McGuire, John F. Hughes
PLDI
2004
ACM
14 years 3 months ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam
SASN
2004
ACM
14 years 3 months ago
Source-location privacy in energy-constrained sensor network routing
As sensor-driven applications become increasingly integrated into our lives, issues related to sensor privacy will become increasingly important. Although many privacy-related iss...
Celal Ozturk, Yanyong Zhang, Wade Trappe
SIGIR
2004
ACM
14 years 3 months ago
Web-a-where: geotagging web content
We describe Web-a-Where, a system for associating geography with Web pages. Web-a-Where locates mentions of places and determines the place each name refers to. In addition, it as...
Einat Amitay, Nadav Har'El, Ron Sivan, Aya Soffer
« Prev « First page 1305 / 1414 Last » Next »