Sciweavers

485 search results - page 22 / 97
» Continuous Spatial Authentication
Sort
View
ICDE
2010
IEEE
247views Database» more  ICDE 2010»
14 years 7 months ago
Efficient Verification of Shortest Path Search via Authenticated Hints
Shortest path search in transportation networks is unarguably one of the most important online search services nowadays (e.g., Google Maps, MapQuest, etc), with applications spanni...
Man Lung Yiu, Yimin Lin, Kyriakos Mouratidis
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 2 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
VIS
2009
IEEE
326views Visualization» more  VIS 2009»
14 years 8 months ago
Continuous Parallel Coordinates
Typical scientific data is represented on a grid with appropriate interpolation or approximation schemes, defined on a continuous domain. The visualization of such data in parallel...
Julian Heinrich, Daniel Weiskopf

Publication
819views
15 years 7 months ago
Continuous Query Processing of Spatio-temporal Data Streams in PLACE
The tremendous increase in the use of cellular phones, GPS-like devices, and RFIDs results in highly dynamic environments where objects as well as queries are continuously moving. ...
Mohamed F. Mokbel, Xiaopeng Xiong, Moustafa A. Ham...
CIKM
2009
Springer
14 years 9 days ago
Scalable continuous range monitoring of moving objects in symbolic indoor space
Indoor spaces accommodate large populations of individuals. The continuous range monitoring of such objects can be used as a foundation for a wide variety of applications, e.g., s...
Bin Yang 0002, Hua Lu, Christian S. Jensen