Sciweavers

10995 search results - page 2148 / 2199
» Positioning
Sort
View
JCT
2010
83views more  JCT 2010»
13 years 7 months ago
Families of prudent self-avoiding walks
A self-avoiding walk (SAW) on the square lattice is prudent if it never takes a step towards a vertex it has already visited. Prudent walks differ from most classes of SAW that ha...
Mireille Bousquet-Mélou
TMC
2008
159views more  TMC 2008»
13 years 7 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
JELIA
2010
Springer
13 years 7 months ago
Stable Belief Sets Revisited
Stable belief sets were introduced by R. Stalnaker in the early ’80s, as a formal representation of the epistemic state for an ideal introspective agent. This notion motivated M...
Costas D. Koutras, Yorgos Zikos
JOCN
2010
62views more  JOCN 2010»
13 years 7 months ago
Electrophysiological Correlates of Complement Coercion
■ This study examined the electrophysiological correlates of complement coercion. ERPs were measured as participants read and made acceptability judgments about plausible coerce...
Gina R. Kuperberg, Arim Choi, Neil Cohn, Martin Pa...
JSAC
2010
78views more  JSAC 2010»
13 years 7 months ago
Evolution of Internet Address Space Deaggregation: Myths and Reality
—Internet routing table size growth and BGP update churn are two prominent Internet scaling issues. There is widespread belief in a high and fast growing number of ASs that deagg...
Luca Cittadini, Wolfgang Mühlbauer, Steve Uhl...
« Prev « First page 2148 / 2199 Last » Next »