Sciweavers

5752 search results - page 1049 / 1151
» Informative Labeling Schemes
Sort
View
PPSN
2010
Springer
13 years 7 months ago
Topography-Aware Sensor Deployment Optimization with CMA-ES
Abstract. Wireless Sensor Networks (WSN) have been studied intensively for various applications such as monitoring and surveillance. Sensor deployment is an essential part of WSN, ...
Vahab Akbarzadeh, Albert Hung-Ren Ko, Christian Ga...
PR
2010
220views more  PR 2010»
13 years 7 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
PVLDB
2010
143views more  PVLDB 2010»
13 years 7 months ago
Embellishing Text Search Queries To Protect User Privacy
Users of text search engines are increasingly wary that their activities may disclose confidential information about their business or personal profiles. It would be desirable f...
HweeHwa Pang, Xuhua Ding, Xiaokui Xiao
SIAMSC
2010
132views more  SIAMSC 2010»
13 years 7 months ago
New Algorithms for Optimal Online Checkpointing
Frequently, the computation of derivatives for optimizing time-dependent problems is based on the integration of the adjoint differential equation. For this purpose, the knowledge...
Philipp Stumm, Andrea Walther
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 7 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
« Prev « First page 1049 / 1151 Last » Next »