Sciweavers

7651 search results - page 1396 / 1531
» Information integration in the enterprise
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 8 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
ACSC
2009
IEEE
15 years 8 months ago
ALARM: An Adaptive Load-Aware Routing Metric for Hybrid Wireless Mesh Networks
Abstract— Hybrid Wireless Mesh Networks (WMN) are generally employed to establish communication during disaster recovery operations. The Hybrid WMN network is formed in a spontan...
Asad Amir Pirzada, Ryan Wishart, Marius Portmann, ...
PERCOM
2009
ACM
15 years 8 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
HRI
2009
ACM
15 years 8 months ago
Providing route directions: design of robot's utterance, gesture, and timing
Providing route directions is a complicated interaction. Utterances are combined with gestures and pronounced with appropriate timing. This study proposes a model for a robot that...
Yusuke Okuno, Takayuki Kanda, Michita Imai, Hirosh...
SEMCO
2009
IEEE
15 years 8 months ago
LAIR: A Language for Automated Semantics-Aware Text Sanitization Based on Frame Semantics
—We present LAIR: A domain-specific language that enables users to specify actions to be taken upon meeting specific semantic frames in a text, in particular to rephrase and re...
Steffen Hedegaard, Søren Houen, Jakob Grue ...
« Prev « First page 1396 / 1531 Last » Next »