Sciweavers

2799 search results - page 29 / 560
» The regenerator location problem
Sort
View
IJCAI
2007
13 years 10 months ago
Inferring Long-term User Properties Based on Users' Location History
Recent development of location technologies enables us to obtain the location history of users. This paper proposes a new method to infer users’ longterm properties from their r...
Yutaka Matsuo, Naoaki Okazaki, Kiyoshi Izumi, Yosh...
IPL
2008
61views more  IPL 2008»
13 years 8 months ago
Online chasing problems for regular polygons
We consider a server location problem with only one server to move. In this paper we assume that a request is given as a region and that the service can be done anywhere inside th...
Hiroshi Fujiwara, Kazuo Iwama, Kouki Yonezawa
FC
2005
Springer
99views Cryptology» more  FC 2005»
14 years 2 months ago
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Paul C. van Oorschot, Stuart G. Stubblebine
AICCSA
2001
IEEE
200views Hardware» more  AICCSA 2001»
14 years 9 days ago
Location Management in Mobile Computing
This paper presents a novel approach based on clustering algorithms in combination with the location area (LA) scheme to solve the mobility management problem. Users' movemen...
Riky Subrata, Albert Y. Zomaya
SODA
2003
ACM
107views Algorithms» more  SODA 2003»
13 years 10 months ago
Fault-tolerant facility location
We consider a fault-tolerant generalization of the classical uncapacitated facility location problem, where each client j has a requirement that rj distinct facilities serve it, i...
Chaitanya Swamy, David B. Shmoys