Sciweavers

5752 search results - page 1049 / 1151
» Informative Labeling Schemes
Sort
View
139
Voted
PPSN
2010
Springer
15 years 1 months ago
Topography-Aware Sensor Deployment Optimization with CMA-ES
Abstract. Wireless Sensor Networks (WSN) have been studied intensively for various applications such as monitoring and surveillance. Sensor deployment is an essential part of WSN, ...
Vahab Akbarzadeh, Albert Hung-Ren Ko, Christian Ga...
142
Voted
PR
2010
220views more  PR 2010»
15 years 1 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
147
Voted
PVLDB
2010
143views more  PVLDB 2010»
15 years 1 months ago
Embellishing Text Search Queries To Protect User Privacy
Users of text search engines are increasingly wary that their activities may disclose confidential information about their business or personal profiles. It would be desirable f...
HweeHwa Pang, Xuhua Ding, Xiaokui Xiao
122
Voted
SIAMSC
2010
132views more  SIAMSC 2010»
15 years 29 days ago
New Algorithms for Optimal Online Checkpointing
Frequently, the computation of derivatives for optimizing time-dependent problems is based on the integration of the adjoint differential equation. For this purpose, the knowledge...
Philipp Stumm, Andrea Walther
151
Voted
VLDB
2010
ACM
190views Database» more  VLDB 2010»
15 years 28 days ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
« Prev « First page 1049 / 1151 Last » Next »