Sciweavers

Share
INFOCOM
2011
IEEE
8 years 1 months ago
Taming user-generated content in mobile networks via Drop Zones
Abstract—Smartphones have changed the way people communicate. Most prominently, using commonplace mobile device features (e.g., high resolution cameras), they started producing a...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
PVLDB
2010
127views more  PVLDB 2010»
8 years 4 months ago
Mining Significant Semantic Locations From GPS Data
With the increasing deployment and use of GPS-enabled devices, massive amounts of GPS data are becoming available. We propose a general framework for the mining of semantically me...
Xin Cao, Gao Cong, Christian S. Jensen
MOBIHOC
2010
ACM
8 years 7 months ago
Spectrum pricing games with bandwidth uncertainty and spatial reuse in cognitive radio networks
In cognitive radio networks (CRN), primary users can lease out their unused bandwidth to secondary users in return for a fee. We study price competition in a CRN with multiple pri...
Gaurav S. Kasbekar, Saswati Sarkar
IEEECIT
2010
IEEE
8 years 7 months ago
Term Weighting Approaches for Mining Significant Locations from Personal Location Logs
In this paper, we describe experiments into the application of term weighting techniques from text retrieval to support the automatic identification of significant locations from ...
Zhengwei Qiu, Cathal Gurrin, Aiden R. Doherty, Ala...
COR
2008
110views more  COR 2008»
8 years 9 months ago
Modeling health care facility location for moving population groups
Locating public services for nomadic population groups is a difficult challenge as the locations of the targeted populations seasonally change. In this paper, the population group...
Malick Ndiaye, Hesham K. Alfares
BIOINFORMATICS
2005
114views more  BIOINFORMATICS 2005»
8 years 9 months ago
Predicting protein localization in budding Yeast
Motivation: Most of the existing methods in predicting protein subcellular location were used to deal with the cases limited within the scope from two to five localizations, and o...
Kuo-Chen Chou, Yu-Dong Cai
TCS
2008
8 years 9 months ago
Security types for dynamic web data
We describe a type system for the Xd calculus of Gardner and Maffeis. An Xd-network is a network of locations, where each location consists of both a data tree (which contains scr...
Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, J...
PERVASIVE
2006
Springer
8 years 9 months ago
Risks of Using AP Locations Discovered Through War Driving
Many pervasive-computing applications depend on knowledge of user location. Because most current location-sensing techniques work only either indoors or outdoors, researchers have ...
Minkyong Kim, Jeffrey J. Fielding, David Kotz
JMLR
2008
159views more  JMLR 2008»
8 years 9 months ago
Near-Optimal Sensor Placements in Gaussian Processes: Theory, Efficient Algorithms and Empirical Studies
When monitoring spatial phenomena, which can often be modeled as Gaussian processes (GPs), choosing sensor locations is a fundamental task. There are several common strategies to ...
Andreas Krause, Ajit Paul Singh, Carlos Guestrin
DEBU
2010
265views more  DEBU 2010»
8 years 9 months ago
GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory
People travel in the real world and leave their location history in a form of trajectories. These trajectories do not only connect locations in the physical world but also bridge ...
Yu Zheng, Xing Xie, Wei-Ying Ma
books