Sciweavers

15254 search results - page 73 / 3051
» A k
Sort
View
IEEEARES
2008
IEEE
15 years 4 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...
ASIAMS
2007
IEEE
15 years 4 months ago
Broadcasting in (n, k)-Arrangement Graph Based on an Optimal Spanning Tree
The tree structure has received much interest as a versatile architecture for a large class of parallel processing applications. Spanning trees in particular are essential tools f...
Jingli Li, Yonghong Xiang, Manli Chen, Yongheng Zh...
ICDE
2007
IEEE
103views Database» more  ICDE 2007»
15 years 4 months ago
A k-Anonymity Model for Spatio-Temporal Data
Polixeni Zacharouli, Aris Gkoulalas-Divanis, Vassi...
ICRA
2007
IEEE
180views Robotics» more  ICRA 2007»
15 years 4 months ago
Energy-efficient Autonomous Four-rotor Flying Robot Controlled at 1 kHz
Daniel Gurdan, Jan Stumpf, Michael Achtelik, Klaus...
ICTAI
2007
IEEE
15 years 4 months ago
k-Attractors: A Clustering Algorithm for Software Measurement Data Analysis
Yiannis Kanellopoulos, Panagiotis Antonellis, Chri...