Sciweavers

2679 search results - page 340 / 536
» Experimental Models for Validating Technology
Sort
View
TDSC
2011
14 years 11 months ago
An Obfuscation-Based Approach for Protecting Location Privacy
—The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the phys...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
147
Voted
IJAHUC
2011
143views more  IJAHUC 2011»
14 years 7 months ago
A mobility framework to improve heterogeneous wireless network services
: We propose and investigate the Internet Protocol version 6 (IPv6) enabled mobility framework to improve the user mobility experience in heterogenous wireless networks. The framew...
Chong Shen, Wencai Du, Robert Atkinson, James Irvi...
NAR
2011
182views Computer Vision» more  NAR 2011»
14 years 7 months ago
PAIR: the predicted Arabidopsis interactome resource
The predicted Arabidopsis interactome resource (PAIR, http://www.cls.zju.edu.cn/pair/), comprised of 5990 experimentally reported molecular interactions in Arabidopsis thaliana to...
Mingzhi Lin, Xueling Shen, Xin Chen
PAMI
2012
13 years 6 months ago
LDAHash: Improved Matching with Smaller Descriptors
—SIFT-like local feature descriptors are ubiquitously employed in such computer vision applications as content-based retrieval, video analysis, copy detection, object recognition...
Christoph Strecha, Alexander A. Bronstein, Michael...
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 6 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...