Sciweavers

16190 search results - page 2847 / 3238
» Applicative programming with effects
Sort
View
TDSC
2011
14 years 10 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
TIFS
2011
252views Education» more  TIFS 2011»
14 years 10 months ago
Quality Assessment of Degraded Iris Images Acquired in the Visible Wavelength
—Data quality assessment is a key issue, in order to broad the applicability of iris biometrics to unconstrained imaging conditions. Previous research efforts sought to use visib...
Hugo Proença
TMC
2011
164views more  TMC 2011»
14 years 10 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
TMM
2011
121views more  TMM 2011»
14 years 10 months ago
Spread Spectrum Visual Sensor Network Resource Management Using an End-to-End Cross-Layer Design
—In this paper, we propose an approach to manage network resources for a direct sequence code division multiple access (DS-CDMA) visual sensor network where nodes monitor scenes ...
Elizabeth S. Bentley, Lisimachos P. Kondi, John D....
TMM
2011
182views more  TMM 2011»
14 years 10 months ago
Scalable Video Multicast in Hybrid 3G/Ad-Hoc Networks
Mobile video broadcasting service, or mobile TV, is expected to become a popular application for 3G wireless network operators. Most existing solutions for video Broadcast Multica...
Sha Hua, Yang Guo, Yong Liu, Hang Liu, Shivendra S...
« Prev « First page 2847 / 3238 Last » Next »