With the development of positioning technologies and the boosting deployment of inexpensive location-aware sensors, large volumes of trajectory data have emerged. However, efficie...
Qiang Ma, Bin Yang 0002, Weining Qian, Aoying Zhou
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
In this paper, two empirical models for the sequence-level distortion-rate performance of predictive video source encoding are proposed. They require very limited amount of empiri...
Ruly Lai-U Choi, Michel T. Ivrlac, Eckehard G. Ste...
Network coordinate (NC) system is an efficient and scalable system for Internet distance prediction. In this paper, we propose 3 two-layer NC systems HNPS, HBBS and HIDES derived f...
Chengbo Dong, Guodong Wang, Xuan Zhang, Beixing De...
Abstract. We present a method for learning characteristic motion patterns of mobile agents. The method works on two levels. On the first level, it uses the expectation-maximization...