Sciweavers

988 search results - page 36 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
LOCA
2007
Springer
14 years 3 months ago
Bootstrapping a Location Service Through Geocoded Postal Addresses
We analyze the feasibility of boostrapping a location service through geocoded postal addresses rather than the common wardriving technique. A location service that contains the MA...
Gayathri Chandrasekaran, Mesut Ali Ergin, Marco Gr...
ICDE
2010
IEEE
562views Database» more  ICDE 2010»
14 years 8 months ago
Multi-Guarded Safe Zone: An Effective Technique to Monitor Moving Circular Range Queries
Given a positive value r, a circular range query returns the objects that lie within the distance r of the query location. In this paper, we study the circular range queries that c...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
MP
2002
195views more  MP 2002»
13 years 8 months ago
Nonlinear rescaling vs. smoothing technique in convex optimization
We introduce an alternative to the smoothing technique approach for constrained optimization. As it turns out for any given smoothing function there exists a modification with part...
Roman A. Polyak
AGP
2003
IEEE
14 years 16 days ago
Advanced Backjumping Techniques for Rule Instantiations
Abstract. The interest in the area of non-monotonic reasoning and declarative logic programming is growing rapidly after the recent development of a number of Answer Set Programmin...
Simona Perri, Francesco Scarcello
DAGSTUHL
2007
13 years 10 months ago
End-User Development Techniques for Enterprise Resource Planning Software Systems
Abstract. The intent of this position paper is to present the focus of interest of our end-user development (EUD) related research at SAP Research CEC Darmstadt, enabling other par...
Michael Spahn, Stefan Scheidl, Todor Stoitsev