Sciweavers

10797 search results - page 2011 / 2160
» Robust control applications
Sort
View
153
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
A theory of cloud bandwidth pricing for video-on-demand providers
—Current-generation cloud computing is offered with usage-based pricing, with no bandwidth capacity guarantees, which is however unappealing to bandwidth-intensive applications s...
Di Niu, Chen Feng, Baochun Li
TVCG
2012
184views Hardware» more  TVCG 2012»
13 years 6 months ago
Output-Sensitive Construction of Reeb Graphs
—The Reeb graph of a scalar function represents the evolution of the topology of its level sets. This paper describes a near-optimal output-sensitive algorithm for computing the ...
Harish Doraiswamy, Vijay Natarajan
SDM
2012
SIAM
307views Data Mining» more  SDM 2012»
13 years 6 months ago
Pseudo Cold Start Link Prediction with Multiple Sources in Social Networks
Link prediction is an important task in social networks and data mining for understanding the mechanisms by which the social networks form and evolve. In most link prediction rese...
Liang Ge, Aidong Zhang
ICIP
2009
IEEE
16 years 4 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
256
Voted
GIS
2004
ACM
16 years 4 months ago
An abstract model of three-dimensional spatial data types
act Model of Three-Dimensional Spatial Data Types Markus Schneider & Brian E Weinrich University of Florida Department of Computer & Information Science & Engineering G...
Markus Schneider, Brian E. Weinrich
« Prev « First page 2011 / 2160 Last » Next »