Sciweavers

10809 search results - page 2034 / 2162
» Location Based Services
Sort
View
INFOCOM
1999
IEEE
15 years 8 months ago
Cell Identification Codes for Tracking Mobile Users
The minimization of the wireless cost of tracking mobile users is a crucial issue in wireless networks. Some of the previous strategies addressing this issue leave an open gap, by ...
Zohar Naor, Hanoch Levy
COLT
1999
Springer
15 years 8 months ago
Regret Bounds for Prediction Problems
We present a unified framework for reasoning about worst-case regret bounds for learning algorithms. This framework is based on the theory of duality of convex functions. It brin...
Geoffrey J. Gordon
ISER
1999
Springer
118views Robotics» more  ISER 1999»
15 years 8 months ago
ACME, A Telerobotic Active Measurement Facility
: We are developing a robotic measurement facility which makes it very easy to build “reality-based” models, i.e., computational models of existing, physical objects based on a...
Dinesh K. Pai, Jochen Lang, John E. Lloyd, Robert ...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 8 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SRDS
1998
IEEE
15 years 8 months ago
A Data Allocation Algorithm for Distributed Hypermedia Documents
A major cost in executing queries in a distributed database system is the data transfer cost incurred in transferring relations (fragments) accessed by a query from different site...
Siu-Kai So, Ishfaq Ahmad, Kamalakar Karlapalem
« Prev « First page 2034 / 2162 Last » Next »