In this paper, we explore the problem of processing a novel type of location based queries, named the location based top-k query, which involves both of spatial and non-spatial sp...
HaRim Jung, Byung Ku Cho, Yon Dohn Chung, Ling Liu
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
We consider the problem of elastic matching of sequences of real numbers. Since both a query and a target sequence may be noisy, i.e., contain some outlier elements, it is desirab...
Longin Jan Latecki, Qiang Wang, Suzan Koknar-Tezel...
We consider a MIMO system where error-prone feedback from the receiver is used by the transmitter to select a single optimum antenna to transmit data. Such error-prone feedback is...
Yabo Li, Neelesh B. Mehta, Andreas F. Molisch, Jin...
The growing demand for high-speed wireless access to the Internet is the driving force behind the current trends to design All-IP wireless networks, whose Access Router and mobile ...