Sciweavers

12825 search results - page 2208 / 2565
» Improved PLSOM algorithm
Sort
View
145
Voted
SENSYS
2010
ACM
15 years 2 months ago
AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages
We present AutoWitness, a system to deter, detect, and track personal property theft, improve historically dismal stolen property recovery rates, and disrupt stolen property distr...
Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath...
178
Voted
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
15 years 2 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
AND
2009
15 years 2 months ago
Accessing the content of Greek historical documents
In this paper, we propose an alternative method for accessing the content of Greek historical documents printed during the 17th and 18th centuries by searching words directly in d...
Anastasios L. Kesidis, Eleni Galiotou, Basilios Ga...
CIKM
2009
Springer
15 years 2 months ago
A tag recommendation system for folksonomy
Social bookmarking tools become more and more popular nowadays and tagging is used to organize information and allow users to recall or search the resources. Users need to type th...
Ning Zhang, Yuan Zhang, Jie Tang
GVD
2009
108views Database» more  GVD 2009»
15 years 2 months ago
Privacy Challenges for Database Systems
Over the last years the means to collect personal data implicitly or explicitly over the Web and by various kinds of sensors and to combine data for profiling individuals has dram...
Johann Christoph Freytag
« Prev « First page 2208 / 2565 Last » Next »