Sciweavers

436 search results - page 58 / 88
» Arguing for gaining access to information
Sort
View
ESORICS
2009
Springer
15 years 6 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
ICASSP
2009
IEEE
15 years 6 months ago
Time-varying Opportunistic Protocol for maximizing sensor networks lifetime
We consider transmission scheduling by medium access control (MAC) protocols for energy limited wireless sensor networks (WSN) in order to maximize the network lifetime. Time-vary...
Kobi Cohen, Amir Leshem
WEBDB
2009
Springer
159views Database» more  WEBDB 2009»
15 years 6 months ago
Beyond the Stars: Improving Rating Predictions using Review Text Content
Online reviews are an important asset for users deciding to buy a product, see a movie, or go to a restaurant, as well as for businesses tracking user feedback. However, most revi...
Gayatree Ganu, Noemie Elhadad, Amélie Maria...
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 6 months ago
Cross-Layer Optimization With Model-Based Parameter Exchange
— Cross-layer optimization (CLO) promises significant gains in comparison to a conventional system design, which does not allow for information exchange across layers. One of th...
Andreas Saul, Shoaib Khan, Gunther Auer, Wolfgang ...
AIME
2007
Springer
15 years 6 months ago
A Concept-Based Framework for Retrieving Evidence to Support Emergency Physician Decision Making at the Point of Care
The goal of evidence-based medicine is to uniformly apply evidence gained from scientific research to aspects of clinical practice. In order to achieve this goal, new applications...
Dympna O'Sullivan, Ken Farion, Stan Matwin, Wojtek...