Sciweavers

184 search results - page 24 / 37
» Extracting a Mobility Model from Real User Traces
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
SIGMOD
2006
ACM
162views Database» more  SIGMOD 2006»
14 years 7 months ago
Efficient query processing in geographic web search engines
Geographic web search engines allow users to constrain and order search results in an intuitive manner by focusing a query on a particular geographic region. Geographic search tec...
Yen-Yu Chen, Torsten Suel, Alexander Markowetz
AMI
2009
Springer
13 years 10 months ago
Sensor-Based Human Activity Recognition in a Multi-user Scenario
Existing work on sensor-based activity recognition focuses mainly on single-user activities. However, in real life, activities are often performed by multiple users involving inter...
Liang Wang, Tao Gu, XianPing Tao, Jian Lu
TACAS
2004
Springer
139views Algorithms» more  TACAS 2004»
14 years 1 months ago
Error Explanation with Distance Metrics
Abstract In the event that a system does not satisfy a specification, a model checker will typically automatically produce a counterexample trace that shows a particular instance ...
Alex Groce
GIS
2007
ACM
14 years 8 months ago
TerraStream: from elevation data to watershed hierarchies
We consider the problem of extracting a river network and a watershed hierarchy from a terrain given as a set of irregularly spaced points. We describe TerraStream, a "pipeli...
Andrew Danner, Thomas Mølhave, Ke Yi, Panka...