Sciweavers

13987 search results - page 2617 / 2798
» The Two Guards Problem
Sort
View
ICDCS
2005
IEEE
14 years 1 months ago
Enhancing Source-Location Privacy in Sensor Network Routing
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal...
ICDCSW
2005
IEEE
14 years 1 months ago
Zmail: Zero-Sum Free Market Control of Spam
The problem of spam is a classic “tragedy of the commons” [10]. We propose the Zmail protocol as a way to preserve email as a “free” common resource for most users, while ...
Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Moha...
ICDE
2005
IEEE
101views Database» more  ICDE 2005»
14 years 1 months ago
Optimization of Nested XQuery Expressions with Orderby Clauses
— XQuery, the defacto XML query language, is a functional language with operational semantics, which precludes the direct application of classical query optimization techniques. ...
Song Wang, Elke A. Rundensteiner, Murali Mani
ICDM
2005
IEEE
122views Data Mining» more  ICDM 2005»
14 years 1 months ago
ViVo: Visual Vocabulary Construction for Mining Biomedical Images
Given a large collection of medical images of several conditions and treatments, how can we succinctly describe the characteristics of each setting? For example, given a large col...
Arnab Bhattacharya, Vebjorn Ljosa, Jia-Yu Pan, Mar...
ICRA
2005
IEEE
116views Robotics» more  ICRA 2005»
14 years 1 months ago
Using Hierarchical EM to Extract Planes from 3D Range Scans
— Recently, the acquisition of three-dimensional maps has become more and more popular. This is motivated by the fact that robots act in the three-dimensional world and several t...
Rudolph Triebel, Wolfram Burgard, Frank Dellaert
« Prev « First page 2617 / 2798 Last » Next »