Sciweavers

4874 search results - page 917 / 975
» Information theory for data management
Sort
View
TMC
2011
164views more  TMC 2011»
14 years 4 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
SAC
2010
ACM
14 years 4 months ago
Convex onion peeling genetic algorithm: an efficient solution to map labeling of point-feature
Map labeling of point-feature is the problem of placing text labels to corresponding point features on a map in a way that minimizes overlaps while satisfying basic rules for the ...
Wan D. Bae, Shayma Alkobaisi, Petr Vojtechovsk&yac...
TMI
2010
132views more  TMI 2010»
14 years 4 months ago
Joint Reconstruction of Image and Motion in Gated Positron Emission Tomography
We present a novel method for joint reconstruction of both image and motion in positron-emission-tomography (PET). Most other methods separate image from motion estimation: They us...
Moritz Blume, Axel Martinez-Möller, Andreas K...
WWW
2009
ACM
15 years 10 months ago
Constructing folksonomies from user-specified relations on flickr
Automatic folksonomy construction from tags has attracted much attention recently. However, inferring hierarchical relations between concepts from tags has a drawback in that it i...
Anon Plangprasopchok, Kristina Lerman
WWW
2007
ACM
15 years 10 months ago
Crawling multiple UDDI business registries
As Web services proliferate, size and magnitude of UDDI Business Registries (UBRs) are likely to increase. The ability to discover Web services of interest then across multiple UB...
Eyhab Al-Masri, Qusay H. Mahmoud