Sciweavers

485 search results - page 96 / 97
» Continuous Spatial Authentication
Sort
View
TMC
2008
159views more  TMC 2008»
13 years 3 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
JIDM
2010
145views more  JIDM 2010»
13 years 3 months ago
Mining Relevant and Extreme Patterns on Climate Time Series with CLIPSMiner
One of the most important challenges for the researchers in the 21st Century is related to global heating and climate change that can have as consequence the intensiļ¬cation of na...
Luciana A. S. Romani, Ana Maria Heuminski de &Aacu...
DPHOTO
2009
138views Hardware» more  DPHOTO 2009»
13 years 2 months ago
Statistical identification and analysis of defect development in digital imagers
The lifetime of solid-state image sensors is limited by the appearance of defects, particularly hot-pixels, which we have previously shown to develop continuously over the sensor ...
Jenny Leung, Glenn H. Chapman, Zahava Koren, Israe...
EUSFLAT
2009
163views Fuzzy Logic» more  EUSFLAT 2009»
13 years 2 months ago
A Fuzzy Set Approach to Ecological Knowledge Discovery
Besides the problem of searching for effective methods for extracting knowledge from large databases (KDD) there are some additional problems with handling ecological data, namely ...
Arkadiusz Salski
IEEEPACT
2009
IEEE
13 years 2 months ago
Region Based Structure Layout Optimization by Selective Data Copying
As the gap between processor and memory continues to grow, memory performance becomes a key performance bottleneck for many applications. Compilers therefore increasingly seek to m...
Sandya S. Mannarswamy, Ramaswamy Govindarajan, Ris...