Sciweavers

5344 search results - page 283 / 1069
» Privacy-Preserving Set Operations
Sort
View
156
Voted
SMI
2010
IEEE
208views Image Analysis» more  SMI 2010»
15 years 2 months ago
Local Constraint-Based General Surface Deformation
—This paper develops a framework for locally deforming either a parametric surface or hierarchical subdivision surface to match a set of positional and energy minimizing constrai...
Richard Pusch, Faramarz Samavati
TCS
2010
15 years 2 months ago
Computing the graph-based parallel complexity of gene assembly
We consider a graph-theoretical formalization of the process of gene assembly in ciliates introduced in Ehrenfeucht et al (2003), where a gene is modeled as a signed graph. The ge...
Artiom Alhazov, Chang Li, Ion Petre
P2P
2010
IEEE
182views Communications» more  P2P 2010»
15 years 2 months ago
Measurement and Analysis of BitTorrent Traffic in Mobile WiMAX Networks
Abstract--As mobile Internet environments are becoming dominant, how to revamp P2P operations for mobile hosts is gaining more and more attention. In this paper, we carry out empir...
Seungbae Kim, Xiaofei Wang, Hyunchul Kim, Taekyoun...
166
Voted
FAST
2009
15 years 1 months ago
On Explicit Provenance Management in RDF/S Graphs
The notion of RDF Named Graphs has been proposed in order to assign provenance information to data described using RDF triples. In this paper, we argue that named graphs alone can...
Panagiotis Pediaditis, Giorgos Flouris, Irini Fund...
148
Voted
FUIN
2010
114views more  FUIN 2010»
15 years 1 months ago
A Logic-Based System for e-Tourism
In this paper we present the IDUM system, a successful application of logic programming to e-tourism. IDUM exploits two technologies that are based on the state-of-the-art ASP syst...
Francesco Ricca, Antonella Dimasi, Giovanni Grasso...