Sciweavers

1640 search results - page 109 / 328
» Deriving Private Information from Randomized Data
Sort
View
COMPSEC
2007
52views more  COMPSEC 2007»
14 years 10 months ago
Privacy-preserving programming using sython
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...
Michael Gaiman, Rahul Simha, Bhagirath Narahari
CORR
2010
Springer
160views Education» more  CORR 2010»
14 years 6 months ago
Routing with Mutual Information Accumulation in Wireless Networks
We investigate optimal routing and scheduling strategies for multi-hop wireless networks with rateless codes. Rateless codes allow each node of the network to accumulate mutual in...
Rahul Urgaonkar, Michael J. Neely
JIPS
2010
154views more  JIPS 2010»
14 years 4 months ago
Mining Spatio-Temporal Patterns in Trajectory Data
Spatio-temporal patterns extracted from historical trajectories of moving objects reveal important knowledge about movement behavior for high quality LBS services. Existing approac...
Juyoung Kang 0002, Hwan-Seung Yong
ECIS
2000
14 years 11 months ago
Metadata-Based Integration of Qualitative and Quantitative Information Resources Approaching Knowledge Management
This paper presents a concept for the integration of quantitative and qualitative information sources with their accompanying management support functionalities from navigation and...
Bodo Rieger, Anja Kleber, Eitel von Maur
TASE
2010
IEEE
14 years 4 months ago
Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance
Abstract--With the availability of powerful computational and communication systems, scientists now readily access large, complicated derived datasets and build on those results to...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...