Sciweavers

266 search results - page 53 / 54
» An Architecture for Privacy-Sensitive Ubiquitous Computing
Sort
View
VLDB
2007
ACM
295views Database» more  VLDB 2007»
13 years 12 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
MOBICOM
2006
ACM
13 years 11 months ago
Characterizing multi-way interference in wireless mesh networks
Wireless mesh networks (WMNs) have been proposed as a solution for ubiquitous last-mile broadband access. A critical limiting factor for many WMN protocols in realizing their thro...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
MSWIM
2006
ACM
13 years 11 months ago
Pattern matching based link quality prediction in wireless mobile ad hoc networks
As mobile devices, such as laptops, PDAs or mobile phones, are getting more and more ubiquitous and are able to communicate with each other via wireless technologies, the paradigm...
Károly Farkas, Theus Hossmann, Lukas Ruf, B...
MM
2004
ACM
100views Multimedia» more  MM 2004»
13 years 11 months ago
GURU: a multimedia distance-learning framework for users with disabilities
GURU is a distance-learning environment that renders multimedia information to users with disabilities in an accessible manner. It is an implementation framework developed as part...
Vidhya Balasubramanian, Nalini Venkatasubramanian
AI
2010
Springer
13 years 6 months ago
Implementing logical connectives in constraint programming
Combining constraints using logical connectives such as disjunction is ubiquitous in constraint programming, because it adds considerable expressive power to a constraint language...
Christopher Jefferson, Neil C. A. Moore, Peter Nig...