Sciweavers

853 search results - page 151 / 171
» From Data Privacy to Location Privacy: Models and Algorithms
Sort
View
TES
2001
Springer
15 years 4 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
PAMI
2008
160views more  PAMI 2008»
14 years 11 months ago
Motion Segmentation and Depth Ordering Using an Occlusion Detector
We present a novel method for motion segmentation and depth ordering from a video sequence in general motion. We first compute motion segmentation based on differential properties ...
Doron Feldman, Daphna Weinshall
EELC
2006
156views Languages» more  EELC 2006»
15 years 3 months ago
The Human Speechome Project
The Human Speechome Project is an effort to observe and computationally model the longitudinal course of language development for a single child at an unprecedented scale. The ide...
Deb Roy, Rupal Patel, Philip DeCamp, Rony Kubat, M...
MOBISYS
2010
ACM
15 years 2 months ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
16 years 4 days ago
Cost-effective outbreak detection in networks
Given a water distribution network, where should we place sensors to quickly detect contaminants? Or, which blogs should we read to avoid missing important stories? These seemingl...
Andreas Krause, Carlos Guestrin, Christos Faloutso...