Sciweavers

9572 search results - page 1810 / 1915
» Cover Algorithms and Their Combination
Sort
View
SSDBM
2009
IEEE
119views Database» more  SSDBM 2009»
15 years 7 months ago
Identifying the Most Endangered Objects from Spatial Datasets
Abstract. Real-life spatial objects are usually described by their geographic locations (e.g., longitude and latitude), and multiple quality attributes. Conventionally, spatial dat...
Hua Lu, Man Lung Yiu
101
Voted
ICNP
2009
IEEE
15 years 7 months ago
Scalable IP Lookups using Shape Graphs
—Recently, there has been much renewed interest in developing compact data structures for packet processing functions such as longest prefix-match for IP lookups. This has been ...
Haoyu Song, Murali S. Kodialam, Fang Hao, T. V. La...
101
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
Abstract—It is challenging to provide authentication to timecritical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only effi...
Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Na...
112
Voted
IROS
2009
IEEE
159views Robotics» more  IROS 2009»
15 years 7 months ago
Data gathering tours for mobile robots
— We study a path planning problem which arises when multiple robots are used to gather data from stationary devices with wireless communication capabilities. Each device has a g...
Deepak Bhadauria, Volkan Isler
107
Voted
WABI
2009
Springer
127views Bioinformatics» more  WABI 2009»
15 years 7 months ago
Constructing Majority-Rule Supertrees
Background: Supertree methods combine the phylogenetic information from multiple partially-overlapping trees into a larger phylogenetic tree called a supertree. Several supertree ...
Jianrong Dong, David Fernández-Baca, Fred R...
« Prev « First page 1810 / 1915 Last » Next »