—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
In this paper, we introduce a 2D particle-based approach to achieve realistic water surface behaviors for interactive applications. We formulate 2D particle-based Shallow Water equ...
Wireless Sensor Networks (WSNs) are currently emerging as one of the most disruptive technologies enabling and supporting next generation ubiquitous and pervasive computing scenari...
Matching elements of two data schemas or two data instances plays a key role in data warehousing, e-business, or even biochemical applications. In this paper we present a matching...
Assistance and service systems are one of the main research topics in robotics today. A major problem for creating these systems is that they have to work and navigate in the real ...