Learn More
Given a set of users, a set of facilities and a query facility q, a reverse k nearest neighbors (RkNN) query returns every user u for which the query is one of its k closest facilities. RkNN queries have been extensively studied under a variety of settings and many sophisticated algorithms have been proposed to answer these queries. However, the existing(More)
Given a set of facilities and a set of users, a reverse k nearest neighbors (RkNN) query q returns every user for which the query facility is one of the k-closest facilities. Due to its importance, RkNN query has received significant research attention in the past few years. Almost all of the existing techniques adopt a pruning-and-verification framework.(More)
Intelligent transportation systems technologies are being developed and applied through transportation systems in the United States. An example of this type of innovation can be seen on toll roads where a driver is required to deposit a toll in order to drive on a toll road. To automatically process toll services, automatic vehicle identification (AVI)(More)
As a biometric trait, finger vein pattern-based technology is highly effective for personal identification with high security. In this paper, we presented the design of a personal identification system based on near infrared (NIR) finger vein image. In this paper, we introduced an observation model of finger vein imaging, upon which a self-adaptive(More)
We study the problem of structural graph clustering, a fundamental problem in managing and analyzing graph data. Given an undirected unweighted graph, structural graph clustering is to assign vertices to clusters, and to identify the sets of hub vertices and outlier vertices as well, such that vertices in the same cluster are densely connected to each other(More)