Sciweavers

4529 search results - page 77 / 906
» Position Based Cryptography
Sort
View
ICANN
2011
Springer
14 years 8 months ago
Semi-supervised Learning for WLAN Positioning
Currently the most accurate WLAN positioning systems are based on the fingerprinting approach, where a “radio map” is constructed by modeling how the signal strength measureme...
Teemu Pulkkinen, Teemu Roos, Petri Myllymäki
RECOMB
2006
Springer
16 years 5 months ago
Inferring Positional Homologs with Common Intervals of Sequences
Inferring orthologous and paralogous genes is an important problem in whole genomes comparisons, both for functional or evolutionary studies. In this paper, we introduce a new appr...
Guillaume Blin, Annie Chateau, Cedric Chauve, Yann...
CIAC
2010
Springer
376views Algorithms» more  CIAC 2010»
16 years 2 months ago
Kernelization for Maximum Leaf Spanning Tree with Positive Vertex Weights
In this paper we consider a natural generalization of the well-known Max Leaf Spanning Tree problem. In the generalized Weighted Max Leaf problem we get as input an undirected co...
Bart Jansen
LION
2009
Springer
203views Optimization» more  LION 2009»
15 years 11 months ago
Position-Guided Tabu Search Algorithm for the Graph Coloring Problem
A very undesirable behavior of any heuristic algorithm is to be stuck in some specific parts of the search space, in particular in the basins of attraction of the local optima. Wh...
Daniel Cosmin Porumbel, Jin-Kao Hao, Pascale Kuntz
HASE
2008
IEEE
15 years 11 months ago
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination
For complex services, logging is an integral part of many middleware aspects, especially, transactions and monitoring. In the event of a failure, the log allows us to deduce the c...
Debmalya Biswas, Thomas Gazagnaire, Blaise Genest