Sciweavers

3319 search results - page 319 / 664
» Type Theoretical Databases
Sort
View
111
Voted
IFIPTCS
2010
15 years 1 months ago
Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility
Most highly dynamic infrastructure-less networks have in common that the assumption of connectivity does not necessarily hold at a given instant. Still, communication routes can be...
Arnaud Casteigts, Paola Flocchini, Bernard Mans, N...
142
Voted
CSE
2009
IEEE
15 years 1 months ago
Edge Anonymity in Social Network Graphs
Edges in social network graphs can model sensitive relationships. In this paper, we consider the problem of edges anonymity in graphs. We propose a probabilistic notion of edge ano...
Lijie Zhang, Weining Zhang
113
Voted
GI
2009
Springer
15 years 1 months ago
Information Fusion for Autonomous Robotic Weeding
: Information fusion has a potential applicability to a multitude of different applications. Still, the JDL model is mostly used to describe defense applications. This paper descri...
Stefan Ericson, Klas Hedenberg, Ronnie Johansson
109
Voted
GI
2009
Springer
15 years 1 months ago
Visualization of the Influence of SDF on the TMA Solution Space
: In [SH08] we introduced a method for the calculation and visualization of the whole TMA solution space. So, not only the best TMA solution, but also other solution areas with hig...
Ulrich Steimel
124
Voted
IFIPTM
2009
163views Management» more  IFIPTM 2009»
15 years 1 months ago
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. Thes...
Adam J. Lee, Marianne Winslett, Kenneth J. Perano