Sciweavers

4051 search results - page 653 / 811
» Aggregation
Sort
View
143
Voted
PVLDB
2008
146views more  PVLDB 2008»
15 years 3 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...
106
Voted
SAC
2008
ACM
15 years 3 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
143
Voted
SAC
2008
ACM
15 years 3 months ago
Error estimation in wireless sensor networks
We present an analogy between the operation of a Wireless Sensor Network and the sampling and reconstruction of a signal. We measure the impact of three factors on the quality of ...
Alejandro César Frery, Heitor Ramos, Jos&ea...
136
Voted
SAC
2008
ACM
15 years 3 months ago
A software architecture for ontology-driven situation awareness
Human operators of large-scale control systems face the problem of information overload induced by the large amount of information provided by multiple heterogeneous and highlydyn...
Norbert Baumgartner, Werner Retschitzegger, Wielan...
153
Voted
TWC
2008
142views more  TWC 2008»
15 years 3 months ago
Robust Ultra-Wideband Signal Acquisition
Ultra-wideband (UWB) communication is envisaged to be deployed in indoor environments, where the noise distribution is decidedly non-Gaussian. A critical challenge for impulse radi...
Ersen Ekrem, Mutlu Koca, Hakan Deliç