Sciweavers

1950 search results - page 258 / 390
» Varieties of Increasing Trees
Sort
View
TON
2010
80views more  TON 2010»
13 years 8 months ago
Replication routing in DTNs: a resource allocation approach
—Routing protocols for disruption-tolerant networks (DTNs) use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and netwo...
Aruna Balasubramanian, Brian Neil Levine, Arun Ven...
TOPLAS
2010
93views more  TOPLAS 2010»
13 years 8 months ago
Semantics of fractional permissions with nesting
Fractional permissions use fractions to distinguish write access (1) from read access (any smaller fraction). Nesting (an extension of adoption) can be used to model object invari...
John Tang Boyland
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
13 years 8 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
ICDM
2010
IEEE
226views Data Mining» more  ICDM 2010»
13 years 8 months ago
Edge Weight Regularization over Multiple Graphs for Similarity Learning
The growth of the web has directly influenced the increase in the availability of relational data. One of the key problems in mining such data is computing the similarity between o...
Pradeep Muthukrishnan, Dragomir R. Radev, Qiaozhu ...
IOT
2010
13 years 8 months ago
BIT - A framework and architecture for providing digital services for physical products
Abstract--Mobile phones are increasingly able to read autoid labels, such as barcodes or RFID tags. As virtually all consumer products sold today are equipped with such a label, th...
Christof Roduner, Marc Langheinrich