Sciweavers

647 search results - page 80 / 130
» On the Universal Generation of Mobility Models
Sort
View
TMC
2008
159views more  TMC 2008»
13 years 6 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
14 years 9 months ago
Efficiently Answering Probabilistic Threshold Top-k Queries on Uncertain Data
on Uncertain Data (Extended Abstract) Ming Hua Jian Pei Wenjie Zhang Xuemin Lin Simon Fraser University, Canada The University of New South Wales & NICTA {mhua, jpei}@cs.sfu.c...
Ming Hua, Jian Pei, Wenjie Zhang, Xuemin Lin
GIS
2008
ACM
14 years 9 months ago
Detecting single file movement
d Abstract] K. Buchin Dept. Computer Science Utrecht University The Netherlands buchin@cs.uu.nl M. Buchin Dept. Computer Science Utrecht University The Netherlands maike@cs.uu.nl ...
Kevin Buchin, Maike Buchin, Joachim Gudmundsson
ADBIS
2010
Springer
333views Database» more  ADBIS 2010»
13 years 9 months ago
Horizontal Partitioning by Predicate Abstraction and Its Application to Data Warehouse Design
al Partitioning by Predicate Abstraction and its Application to Data Warehouse Design Aleksandar Dimovski1 , Goran Velinov2 , and Dragan Sahpaski2 1 Faculty of Information-Communic...
Aleksandar Dimovski, Goran Velinov, Dragan Sahpask...
EOR
2010
87views more  EOR 2010»
13 years 8 months ago
Inventory systems with stochastic demand and supply: Properties and approximations
ic copy available at: http://ssrn.com/abstract=1115410 Inventory Systems with Stochastic Demand and Supply: Properties and Approximations Amanda J. Schmitt Center for Transportatio...
Amanda J. Schmitt, Lawrence V. Snyder, Zuo-Jun Max...