Sciweavers

GI
2007
Springer
14 years 3 months ago
What is Ubiquitous about Ubiquitous Computing? - Space, Technology, Surveillance, and Behaviour
: Discussing ubiquitous computing, the role of space is not quite clear. To get an understanding of the thinking on space, the main concepts of absolute, relational, and social spa...
Martin Klamt
GI
2007
Springer
14 years 3 months ago
Modelling of Rowing Dynamics Using Mixed Reality Bond Graphs
: The aim of this paper is to present a modelling of rowing dynamics using bond graphs and to replace it by a modelling of mixed reality rowing dynamics using Mixed Reality Bond Gr...
Yong-Hoo Yoo
DIS
2009
Springer
14 years 3 months ago
Discovering Influential Nodes for SIS Models in Social Networks
We address the problem of efficiently discovering the influential nodes in a social network under the susceptible/infected/susceptible (SIS) model, a diffusion model where nodes ar...
Kazumi Saito, Masahiro Kimura, Hiroshi Motoda
FOCS
2007
IEEE
14 years 3 months ago
Discrepancy and the Power of Bottom Fan-in in Depth-three Circuits
We develop a new technique of proving lower bounds for the randomized communication complexity of boolean functions in the multiparty `Number on the Forehead' model. Our meth...
Arkadev Chattopadhyay
FOCS
2007
IEEE
14 years 3 months ago
Minimizing Average Flow-time : Upper and Lower Bounds
We consider the problem of minimizing average flow time on multiple machines when each job can be assigned only to a specified subset of the machines. This is a special case of sc...
Naveen Garg, Amit Kumar
FOCS
2007
IEEE
14 years 3 months ago
Local Global Tradeoffs in Metric Embeddings
Suppose that every k points in a n point metric space X are D-distortion embed
Moses Charikar, Konstantin Makarychev, Yury Makary...
FOCS
2007
IEEE
14 years 3 months ago
Inferring Local Homology from Sampled Stratified Spaces
We study the reconstruction of a stratified space from a possibly noisy point sample. Specifically, we use the vineyard of the distance function restricted to a 1-parameter family...
Paul Bendich, David Cohen-Steiner, Herbert Edelsbr...
FOCS
2007
IEEE
14 years 3 months ago
Space-Efficient Identity Based Encryption Without Pairings
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which build...
Dan Boneh, Craig Gentry, Michael Hamburg