Sciweavers

1224 search results - page 235 / 245
» Categories of Containers
Sort
View
WISEC
2010
ACM
14 years 11 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
ANCS
2009
ACM
14 years 11 months ago
Weighted random oblivious routing on torus networks
Torus, mesh, and flattened butterfly networks have all been considered as candidate architectures for on-chip interconnection networks. In this paper, we study the problem of opti...
Rohit Sunkam Ramanujam, Bill Lin
CLEF
2009
Springer
14 years 11 months ago
Overview of VideoCLEF 2009: New Perspectives on Speech-Based Multimedia Content Enrichment
VideoCLEF 2009 offered three tasks related to enriching video content for improved multimedia access in a multilingual environment. For each task, video data (Dutch-language telev...
Martha Larson, Eamonn Newman, Gareth J. F. Jones
CLEF
2009
Springer
14 years 11 months ago
Diversity in Photo Retrieval: Overview of the ImageCLEFPhoto Task 2009
The ImageCLEF Photo Retrieval Task 2009 focused on image retrieval and diversity. A new collection was utilised in this task consisting of approximately half a million images with...
Monica Lestari Paramita, Mark Sanderson, Paul Clou...
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
14 years 11 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...