Sciweavers

485 search results - page 21 / 97
» Continuous Spatial Authentication
Sort
View
TKDE
2011
266views more  TKDE 2011»
12 years 11 months ago
Continuous Monitoring of Distance Based Range Queries
Given a positive value r, a distance based range query returns the objects that lie within the distance r of the query location. In this paper, we focus on the distance based rang...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
SIGMOD
2006
ACM
126views Database» more  SIGMOD 2006»
14 years 7 months ago
Constraint chaining: on energy-efficient continuous monitoring in sensor networks
Wireless sensor networks have created new opportunities for data collection in a variety of scenarios, such as environmental and industrial, where we expect data to be temporally ...
Adam Silberstein, Jun Yang 0001, Rebecca Braynard
MOBILERESPONSE
2007
Springer
14 years 1 months ago
Adding Space to Location in Mobile Emergency Response Technologies
Abstract. In this paper, the potential of Mobile Spatial Interaction for Emergency Response Technologies is presented. The following basic advantages compared to traditional locati...
Peter Fröhlich, Rainer Simon, Christian Kaufm...
RIA
2006
60views more  RIA 2006»
13 years 7 months ago
GACS : une approche ascendante pour la coordination spatiale
ABSTRACT. The design of spatial coordination mechanisms for dynamical and continuous multiagent setting is a difficult challenge. While the top-down decomposition approach is ineff...
Fabien Flacher, Olivier Sigaud
ICTAI
2006
IEEE
14 years 1 months ago
On the Relationships between Clustering and Spatial Co-location Pattern Mining
The goal of spatial co-location pattern mining is to find subsets of spatial features frequently located together in spatial proximity. Example co-location patterns include servi...
Yan Huang, Pusheng Zhang