Sciweavers

1349 search results - page 173 / 270
» Towards a theory of events
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 11 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
GISCIENCE
2008
Springer
145views GIS» more  GISCIENCE 2008»
13 years 11 months ago
Similarity-Based Information Retrieval and Its Role within Spatial Data Infrastructures
While similarity has gained in importance in research about information retrieval on the (geospatial) semantic Web, information retrieval paradigms and their integration into exist...
Krzysztof Janowicz, Marc Wilkes, Michael Lutz
ANOR
2006
64views more  ANOR 2006»
13 years 10 months ago
A note on asymptotic formulae for one-dimensional network flow problems
This note develops asymptotic formulae for single-commodity network flow problems with random inputs. The transportation linear programming problem (TLP) where N points lie in a r...
Carlos F. Daganzo, Karen R. Smilowitz
AUTOMATICA
2006
94views more  AUTOMATICA 2006»
13 years 10 months ago
Subspace identification for FDI in systems with non-uniformly sampled multirate data
This paper proposes a novel subspace approach towards direct identification of a residual model for fault detection and isolation (FDI) in a system with non-uniformly sampled mult...
Weihua Li, Zhengang Han, Sirish L. Shah
COMBINATORICS
2006
124views more  COMBINATORICS 2006»
13 years 10 months ago
Bounded-Degree Graphs have Arbitrarily Large Geometric Thickness
Abstract. The geometric thickness of a graph G is the minimum integer k such that there is a straight line drawing of G with its edge set partitioned into k plane subgraphs. Eppste...
János Barát, Jirí Matousek, D...