Sciweavers

1093 search results - page 68 / 219
» Probabilistic Location and Routing
Sort
View
126
Voted
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
16 years 23 days ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
133
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
A Mobicast Routing Protocol in Vehicular Ad-Hoc Networks
In this paper, we present a spatiotemporal multicast , called a mobicast, protocol for supporting applications which require spatiotemporal coordination in VANETs. The spatiotempor...
Yuh-Shyan Chen, Yun-Wei Lin, Sing-Ling Lee
140
Voted
CORR
2007
Springer
160views Education» more  CORR 2007»
15 years 3 months ago
On the Correlation of Geographic and Network Proximity at Internet Edges and its Implications for Mobile Unicast and Multicast R
Signicant eort has been invested recently to accelerate handover operations in a next generation mobile Internet. Corresponding works for developing ecient mobile multicast man...
Thomas C. Schmidt, Matthias Wählisch, Ying Zh...
145
Voted
PC
2007
112views Management» more  PC 2007»
15 years 3 months ago
Service address routing: a network-embedded resource management layer for cluster computing
Service address routing is introduced as a novel and powerful paradigm for the integration of resource management functions into the interconnection fabric of cluster computers. S...
Isaac D. Scherson, Daniel S. Valencia, Enrique Cau...
145
Voted
SODA
2010
ACM
172views Algorithms» more  SODA 2010»
16 years 29 days ago
A quasi-polynomial time approximation scheme for Euclidean capacitated vehicle routing
In the capacitated vehicle routing problem, introduced by Dantzig and Ramser in 1959, we are given the locations of n customers and a depot, along with a vehicle of capacity k, an...
Aparna Das, Claire Mathieu