Sciweavers

588 search results - page 116 / 118
» Querying Objects Modeled by Arbitrary Probability Distributi...
Sort
View
95
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
Utility-Optimal Medium Access Control: Reverse and Forward Engineering
— This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc networks through the network utility maximization (NUM) framework. We first reverse-e...
Jang-Won Lee, Mung Chiang, A. Robert Calderbank
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
GIS
2004
ACM
15 years 10 months ago
Grid metadata catalog service-based OGC web registry service
Grid is a promising e-Science infrastructure that promotes and facilitates the sharing and collaboration in the use of distributed heterogeneous resources through Virtual Organiza...
Peisheng Zhao, Aijun Chen, Yang Liu, Liping Di, We...
SIGMOD
2008
ACM
191views Database» more  SIGMOD 2008»
15 years 9 months ago
Efficient aggregation for graph summarization
Graphs are widely used to model real world objects and their relationships, and large graph datasets are common in many application domains. To understand the underlying character...
Yuanyuan Tian, Richard A. Hankins, Jignesh M. Pate...
CIVR
2007
Springer
180views Image Analysis» more  CIVR 2007»
15 years 3 months ago
Probabilistic matching and resemblance evaluation of shapes in trademark images
We present a novel matching and similarity evaluation method for planar geometric shapes represented by sets of polygonal curves. Given two shapes, the matching algorithm randomly...
Helmut Alt, Ludmila Scharf, Sven Scholz