In this paper we introduce an effective method to construct a global spatio-temporal representation for action recognition. This representation is inspired by the fact that human ...
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
We have constructed a computer model of the cytotoxic T lymphocyte (CTL) response to antigen and the maintenance of immunological memory. Because immune responses often begin with...
Dennis L. Chao, Miles P. Davenport, Stephanie Forr...
In this paper, we propose a novel MAC protocol, called Quality-ofservice Guarantee Multiple Access (QGMA), in wireless local area networks to support the quality of service requir...
As the number of people browsing the world-wide web increases explosively, workload of popular web servers also increases rapidly. A multicomputer system that was designed for I/O...