Sciweavers

CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 5 months ago
Rate Regions of Secret Key Sharing in a New Source Model
A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, at the other si...
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Rez...
COMCOM
2008
112views more  COMCOM 2008»
13 years 5 months ago
A game-theoretic analysis of wireless access point selection by mobile users
A user located in a congested area of a wireless LAN may benefit by moving to a less-crowded area and using a less-loaded access point. This idea has gained attention from research...
Kimaya Mittal, Elizabeth M. Belding, Subhash Suri
CGF
2008
179views more  CGF 2008»
13 years 5 months ago
Sketching MLS Image Deformations On the GPU
In this paper, we present an image editing tool that allows the user to deform images using a sketch-based interface. The user simply sketches a set of source curves in the input ...
Yanlin Weng, Xiaohan Shi, Hujun Bao, Jun Zhang
CGF
2008
79views more  CGF 2008»
13 years 5 months ago
Evaluation of illustration-inspired techniques for time-varying data visualization
Illustration-inspired techniques have provided alternative ways to visualize time-varying data. Techniques such as speedlines, flow ribbons, strobe silhouettes and opacity-based t...
Alark Joshi, Penny Rheingans
CGF
2010
106views more  CGF 2010»
13 years 5 months ago
Alleviating the Modifiable Areal Unit Problem within Probe-Based Geospatial Analyses
We present a probe-based interface for the exploration of the results of a geospatial simulation of urban growth. Because our interface allows the user great freedom in how they c...
Thomas Butkiewicz, Ross K. Meentemeyer, Douglas A....
AICOM
2008
95views more  AICOM 2008»
13 years 5 months ago
A multilayer ontology-based hybrid recommendation model
We propose a novel hybrid recommendation model in which user preferences and item features are described in terms of semantic concepts defined in domain ontologies. The exploitati...
Iván Cantador, Alejandro Bellogín, P...
AI
2010
Springer
13 years 5 months ago
Elicitation strategies for soft constraint problems with missing preferences: Properties, algorithms and experimental studies
We consider soft constraint problems where some of the preferences may be unspecified. This models, for example, settings where agents are distributed and have privacy issues, or ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
IAT
2007
IEEE
13 years 5 months ago
Similarity-Based Fuzzy Clustering for User Profiling
User profiling is a fundamental task in Web personalization. Fuzzy clustering is a valid approach to derive user profiles by capturing similar user interests from web usage data a...
Giovanna Castellano, Anna Maria Fanelli, Corrado M...
WWW
2010
ACM
13 years 5 months ago
Anonymizing user profiles for personalized web search
We study the problem of anonymizing user profiles so that user privacy is sufficiently protected while the anonymized profiles are still effective in enabling personalized web sea...
Yun Zhu, Li Xiong, Christopher Verdery
SIGCOMM
2010
ACM
13 years 5 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi