Sciweavers

563 search results - page 113 / 113
» Design and Implementation of Network Performance Aware Appli...
Sort
View
TMC
2008
159views more  TMC 2008»
13 years 3 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
WWW
2007
ACM
14 years 5 months ago
Efficient search in large textual collections with redundancy
Current web search engines focus on searching only the most recent snapshot of the web. In some cases, however, it would be desirable to search over collections that include many ...
Jiangong Zhang, Torsten Suel
EDBT
2008
ACM
171views Database» more  EDBT 2008»
14 years 5 months ago
Replay-based approaches to revision processing in stream query engines
Data stream processing systems have become ubiquitous in academic and commercial sectors, with application areas that include financial services, network traffic analysis, battlef...
Anurag Maskey, Mitch Cherniack