Sciweavers

853 search results - page 155 / 171
» From Data Privacy to Location Privacy: Models and Algorithms
Sort
View
OOPSLA
2005
Springer
15 years 5 months ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll
STOC
2007
ACM
136views Algorithms» more  STOC 2007»
16 years 13 hour ago
Exponential separations for one-way quantum communication complexity, with applications to cryptography
We give an exponential separation between one-way quantum and classical communication protocols for two partial Boolean functions, both of which are variants of the Boolean Hidden...
Dmitry Gavinsky, Julia Kempe, Iordanis Kerenidis, ...
MMS
2006
14 years 11 months ago
View-invariant motion trajectory-based activity classification and recognition
Motion trajectories provide rich spatio-temporal information about an object's activity. The trajectory information can be obtained using a tracking algorithm on data streams ...
Faisal I. Bashir, Ashfaq A. Khokhar, Dan Schonfeld
ISBI
2008
IEEE
16 years 12 days ago
Axonal bouton modeling, detection and distribution analysis for the study of neural circuit organization and plasticity
We propose a novel method for axonal bouton modeling and automated detection in populations of labeled neurons, as well as bouton distribution analysis for the study of neural cir...
Abhay Mavalankar, Amina Chebira, Christina A. Hall...
SIGMOD
2010
ACM
267views Database» more  SIGMOD 2010»
15 years 4 months ago
Processing proximity relations in road networks
Applications ranging from location-based services to multi-player online gaming require continuous query support to monitor, track, and detect events of interest among sets of mov...
Zhengdao Xu, Hans-Arno Jacobsen