Sciweavers

1689 search results - page 95 / 338
» Proximate point searching
Sort
View
88
Voted
WMCSA
2009
IEEE
15 years 7 months ago
Enabling new mobile applications with location proofs
Location is rapidly becoming the next “killer application” as location-enabled mobile handheld devices proliferate. One class of applications that has yet-to-emerge are those ...
Stefan Saroiu, Alec Wolman
98
Voted
ICDM
2009
IEEE
112views Data Mining» more  ICDM 2009»
15 years 7 months ago
Resolving Identity Uncertainty with Learned Random Walks
A pervasive problem in large relational databases is identity uncertainty which occurs when multiple entries in a database refer to the same underlying entity in the world. Relati...
Ted Sandler, Lyle H. Ungar, Koby Crammer
ICC
2007
IEEE
145views Communications» more  ICC 2007»
15 years 7 months ago
Half Direct-Link Setup (H-DLS) for Fairness between External and Local TCP Connections in IEEE 802.11e Wireless LANs
— The IEEE 802.11e standard supports a Direct-Link Setup (DLS) mechanism optionally to improve the throughput. Using this mechanism, IEEE 802.11e stations in proximity can direct...
Nakjung Choi, Yongho Seok, Yanghee Choi, Taekyoung...
81
Voted
ICDCSW
2006
IEEE
15 years 6 months ago
The Key Knob
Locks are mechanical fastening devices used on various kinds of objects like doors and vehicles, and they can be released using a certain type of key. They have a long history, fr...
Alois Ferscha, Clemens Holzmann, Stefan Resmerita
ITCC
2005
IEEE
15 years 6 months ago
Mining Biomedical Images with Density-Based Clustering
Density-based clustering algorithms have recently gained popularity in the data mining field due to their ability to discover arbitrary shaped clusters while preserving spatial pr...
M. Emre Celebi, Y. Alp Aslandogan, Paul R. Bergstr...