Sciweavers

110 search results - page 12 / 22
» Data degradation: making private data less sensitive over ti...
Sort
View
IEEESP
2010
101views more  IEEESP 2010»
14 years 8 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato
JFR
2007
144views more  JFR 2007»
14 years 9 months ago
Real-Time SLAM with Octree Evidence Grids for Exploration in Underwater Tunnels
We describe a Simultaneous Localization and Mapping (SLAM) method for a hovering underwater vehicle that will explore underwater caves and tunnels, a true three dimensional (3D) e...
Nathaniel Fairfield, George Kantor, David Wettergr...
WWW
2007
ACM
15 years 10 months ago
Optimized query planning of continuous aggregation queries in dynamic data dissemination networks
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Krithi Ramamritham
NETWORKING
2004
14 years 11 months ago
Performance of Directional Collision Avoidance in Ad Hoc Networks
Abstract. This paper analyzes the performance of directional collision avoidance schemes, in which antenna systems are used to direct the transmission and reception of control and ...
Yu Wang 0007, J. J. Garcia-Luna-Aceves
ICWE
2009
Springer
15 years 4 months ago
Trust and Reputation Mining in Professional Virtual Communities
Abstract. Communication technologies, such as e-mail, instant messaging, discussion forums, blogs, and newsgroups connect people together, forming virtual communities. This concept...
Florian Skopik, Hong Linh Truong, Schahram Dustdar