Sciweavers

2421 search results - page 450 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
TMC
2012
12 years 8 days ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
FMICS
2009
Springer
14 years 4 months ago
A Rigorous Methodology for Composing Services
on Abstraction: a Lightweight Approach to Modelling Concurrency. Javier de Dios and Ricardo Peña Certified Implementation on top of the Java Virtual Machine 19:00 Social dinner + ...
Kenneth J. Turner, Koon Leai Larry Tan
DEXA
2009
Springer
175views Database» more  DEXA 2009»
14 years 4 months ago
RoK: Roll-Up with the K-Means Clustering Method for Recommending OLAP Queries
Dimension hierarchies represent a substantial part of the data warehouse model. Indeed they allow decision makers to examine data at different levels of detail with On-Line Analyt...
Fadila Bentayeb, Cécile Favre
RSS
2007
192views Robotics» more  RSS 2007»
13 years 11 months ago
Map-Based Precision Vehicle Localization in Urban Environments
Abstract— Many urban navigation applications (e.g., autonomous navigation, driver assistance systems) can benefit greatly from localization with centimeter accuracy. Yet such ac...
Jesse Levinson, Michael Montemerlo, Sebastian Thru...
SIAMSC
2011
85views more  SIAMSC 2011»
13 years 21 days ago
Refinement and Connectivity Algorithms for Adaptive Discontinuous Galerkin Methods
Abstract. Adaptive multiscale methods are among the many effective techniques for the numerical solution of partial differential equations. Efficient grid management is an import...
Kolja Brix, Ralf Massjung, Alexander Voss