Sciweavers

492 search results - page 63 / 99
» Perfect Matching Preservers
Sort
View
ICPR
2008
IEEE
16 years 1 months ago
Securing fingerprint template: Fuzzy vault with minutiae descriptors
Fuzzy vault has been shown to be an effective technique for securing fingerprint minutiae templates. Its security depends on the difficulty in identifying the set of genuine minut...
Abhishek Nagar, Anil K. Jain, Karthik Nandakumar
PODS
2008
ACM
141views Database» more  PODS 2008»
16 years 3 hour ago
On the complexity of deriving schema mappings from database instances
We introduce a theoretical framework for discovering relationships between two database instances over distinct and unknown schemata. This framework is grounded in the context of ...
Pierre Senellart, Georg Gottlob
GLOBECOM
2009
IEEE
15 years 6 months ago
Maximizing Lifetime of Sensor-Target Surveillance in Wireless Sensor Networks
—The paper addresses the maximal lifetime problem in sensor-target surveillance networks. Given a set of sensors and targets in an Euclidean plane, each sensor can watch all targ...
Hai Liu, Xiaowen Chu, Yiu-Wing Leung, Xiaohua Jia,...
ICC
2009
IEEE
119views Communications» more  ICC 2009»
15 years 6 months ago
Distributed Turbo Trellis Coded Modulation for Cooperative Communications
— In this contribution, we propose a Distributed Turbo Trellis Coded Modulation (DTTCM) scheme for cooperative communications. The DTTCM scheme is designed based on its decoding ...
Soon Xin Ng, Yonghui Li, Lajos Hanzo
IWOCA
2009
Springer
104views Algorithms» more  IWOCA 2009»
15 years 6 months ago
An O(n)-Time Algorithm for the Paired-Domination Problem on Permutation Graphs
A vertex subset D of a graph G is a dominating set if every vertex of G is either in D or is adjacent to a vertex in D. The paired-domination problem on G asks for a minimum-cardi...
Evaggelos Lappas, Stavros D. Nikolopoulos, Leonida...