Sciweavers

1566 search results - page 155 / 314
» On a Cone Covering Problem
Sort
View
SECON
2010
IEEE
15 years 2 months ago
Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks: Efficient Approximations
In a wireless sensor network, short range multihop transmissions are preferred to prolong the network lifetime due to super-linear nature of energy consumption with communication d...
Dejun Yang, Satyajayant Misra, Xi Fang, Guoliang X...
141
Voted
CVPR
2008
IEEE
16 years 6 months ago
IM2GPS: estimating geographic information from a single image
Estimating geographic information from an image is an excellent, difficult high-level computer vision problem whose time has come. The emergence of vast amounts of geographically-...
James Hays, Alexei A. Efros
232
Voted
VLDB
2001
ACM
107views Database» more  VLDB 2001»
16 years 4 months ago
A survey of approaches to automatic schema matching
Schema matching is a basic problem in many database application domains, such as data integration, Ebusiness, data warehousing, and semantic query processing. In current implementa...
Erhard Rahm, Philip A. Bernstein
149
Voted
EDBT
2004
ACM
147views Database» more  EDBT 2004»
16 years 4 months ago
Efficient Query Evaluation over Compressed XML Data
XML suffers from the major limitation of high redundancy. Even if compression can be beneficial for XML data, however, once compressed, the data can be seldom browsed and queried i...
Andrei Arion, Angela Bonifati, Gianni Costa, Sandr...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
16 years 1 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan