Sciweavers

14078 search results - page 2399 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
TMC
2011
1105views more  TMC 2011»
14 years 12 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
CIKM
2011
Springer
14 years 5 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier
CVPR
2008
IEEE
16 years 7 months ago
Multi-object shape estimation and tracking from silhouette cues
This paper deals with the 3D shape estimation from silhouette cues of multiple moving objects in general indoor or outdoor 3D scenes with potential static obstacles, using multipl...
Li Guan, Jean-Sébastien Franco, Marc Pollef...
ICDE
2009
IEEE
135views Database» more  ICDE 2009»
16 years 6 months ago
Forward Decay: A Practical Time Decay Model for Streaming Systems
Temporal data analysis in data warehouses and data streaming systems often uses time decay to reduce the importance of older tuples, without eliminating their influence, on the res...
Graham Cormode, Vladislav Shkapenyuk, Divesh Sriva...
POPL
2008
ACM
16 years 5 months ago
Generating precise and concise procedure summaries
We present a framework for generating procedure summaries that are precise -- applying the summary in a given context yields the same result as re-analyzing the procedure in that ...
Greta Yorsh, Eran Yahav, Satish Chandra
« Prev « First page 2399 / 2816 Last » Next »