Sciweavers

1196 search results - page 186 / 240
» DASCOSA: Database Support for Computational Science Applicat...
Sort
View
ICDE
2011
IEEE
380views Database» more  ICDE 2011»
14 years 1 months ago
Influence Zone: Efficiently Processing Reverse k Nearest Neighbors Queries
Given a set of objects and a query q, a point p is called the reverse k nearest neighbor (RkNN) of q if q is one of the k closest objects of p. In this paper, we introduce the c...
Muhammad Aamir Cheema, Xuemin Lin, Wenjie Zhang, Y...
DATAMINE
2002
104views more  DATAMINE 2002»
14 years 9 months ago
Cubegrades: Generalizing Association Rules
Cubegrades are generalization of association rules which represent how a set of measures (aggregates) is affected by modifying a cube through specialization (rolldown), generaliza...
Tomasz Imielinski, Leonid Khachiyan, Amin Abdulgha...
CCS
2007
ACM
15 years 3 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
MOBISYS
2006
ACM
15 years 9 months ago
FireWxNet: a multi-tiered portable wireless system for monitoring weather conditions in wildland fire environments
In this paper we present FireWxNet, a multi-tiered portable wireless system for monitoring weather conditions in rugged wildland fire environments. FireWxNet provides the fire fig...
Carl Hartung, Richard Han, Carl Seielstad, Saxon H...
FOCS
2005
IEEE
15 years 3 months ago
How to Pay, Come What May: Approximation Algorithms for Demand-Robust Covering Problems
Robust optimization has traditionally focused on uncertainty in data and costs in optimization problems to formulate models whose solutions will be optimal in the worstcase among ...
Kedar Dhamdhere, Vineet Goyal, R. Ravi, Mohit Sing...