Sciweavers

220 search results - page 35 / 44
» Primal-Dual Algorithms for Connected Facility Location Probl...
Sort
View
TC
1998
13 years 7 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
AGILE
2009
Springer
210views GIS» more  AGILE 2009»
14 years 2 months ago
Detecting Hotspots in Geographic Networks
We study a point pattern detection problem on networks, motivated by geographical analysis tasks, such as crime hotspot detection. Given a network N (for example, a street, train,...
Kevin Buchin, Sergio Cabello, Joachim Gudmundsson,...
FOCS
2007
IEEE
14 years 1 months ago
Maximizing Non-Monotone Submodular Functions
Submodular maximization generalizes many important problems including Max Cut in directed/undirected graphs and hypergraphs, certain constraint satisfaction problems and maximum f...
Uriel Feige, Vahab S. Mirrokni, Jan Vondrák
ICRA
2008
IEEE
144views Robotics» more  ICRA 2008»
14 years 1 months ago
Decentralized mapping of robot-aided sensor networks
— A key problem in deploying sensor networks in real-world applications is that of mapping, i.e. determining the location of each sensor such that subsequent tasks such as tracki...
Joseph Djugash, Sanjiv Singh, Ben Grocholsky
TON
2010
197views more  TON 2010»
13 years 5 months ago
Constrained relay node placement in wireless sensor networks: formulation and approximations
—One approach to prolong the lifetime of a wireless sensor network (WSN) is to deploy some relay nodes to communicate with the sensor nodes, other relay nodes, and the base stati...
Satyajayant Misra, Seung Don Hong, Guoliang Xue, J...