Sciweavers

837 search results - page 120 / 168
» Hard combinators
Sort
View
138
Voted
MOBICOM
2009
ACM
15 years 10 months ago
SurroundSense: mobile phone localization via ambience fingerprinting
A growing number of mobile computing applications are centered around the user’s location. The notion of location is broad, ranging from physical coordinates (latitude/longitude...
Martin Azizyan, Ionut Constandache, Romit Roy Chou...
SACMAT
2009
ACM
15 years 10 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
SIGCOMM
2009
ACM
15 years 10 months ago
VUPoints: collaborative sensing and video recording through mobile phones
Mobile phones are becoming a convergent platform for sensing, computation, and communication. This paper envisions VUPoints, a collaborative sensing and video-recording system tha...
Xuan Bao, Romit Roy Choudhury
SIGECOM
2009
ACM
137views ECommerce» more  SIGECOM 2009»
15 years 10 months ago
An exact almost optimal algorithm for target set selection in social networks
The Target Set Selection problem proposed by Kempe, Kleinberg, and Tardos, gives a nice clean combinatorial formulation for many problems arising in economy, sociology, and medicin...
Oren Ben-Zwi, Danny Hermelin, Daniel Lokshtanov, I...
EDBT
2010
ACM
188views Database» more  EDBT 2010»
15 years 10 months ago
Subsumption and complementation as data fusion operators
The goal of data fusion is to combine several representations of one real world object into a single, consistent representation, e.g., in data integration. A very popular operator...
Jens Bleiholder, Sascha Szott, Melanie Herschel, F...