Sciweavers

576 search results - page 81 / 116
» Uncertainty in Knowledge Provenance
Sort
View
INFOCOM
2009
IEEE
14 years 4 months ago
Power Controlled Scheduling with Consecutive Transmission Constraints: Complexity Analysis and Algorithm Design
Abstract—We study the joint power control and minimumframe-length scheduling problem in wireless networks, under the physical interference model and subject to consecutive transm...
Liqun Fu, Soung Chang Liew, Jianwei Huang
ACIVS
2008
Springer
14 years 4 months ago
Foliage Recognition Based on Local Edge Information
In many real-world object recognition applications, texture plays a very important role. Much research has gone into texture-based segmentation methods, which focus on finding the...
David Van Hamme, Peter Veelaert, Wilfried Philips,...
ISW
2007
Springer
14 years 4 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
WEBI
2007
Springer
14 years 4 months ago
OOPS: User Modeling Method for Task Oriented Mobile Internet Services
Growth in the mobile services industry has remarkably increased in the number of mobile services provided, and present methods of service provision have proven insufficient to gui...
Munehiko Sasajima, Yoshinobu Kitamura, Takefumi Na...
DASFAA
2005
IEEE
136views Database» more  DASFAA 2005»
14 years 3 months ago
Distributed Intersection Join of Complex Interval Sequences
In many different application areas, e.g. space observation systems or engineering systems of world-wide operating companies, there is a need for an efficient distributed intersect...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...