Sciweavers

1202 search results - page 207 / 241
» Knowledge as a Service and Knowledge Breaching
Sort
View
DMIN
2009
222views Data Mining» more  DMIN 2009»
14 years 9 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
75
Voted
ICC
2009
IEEE
151views Communications» more  ICC 2009»
14 years 9 months ago
Mapping Techniques for UWB Positioning
This paper deals with a wireless indoor positioning problem in which the location of a tag is estimated from range measurements taken by fixed beacons. The measurements may be affe...
E. Arias-de-Reyna, Umberto Mengali
IEEECGIV
2009
IEEE
14 years 9 months ago
TagReel: A Visualization of Tag Relations among User Interests in the Social Tagging System
Social tagging systems provide users with the ability to share information and extend their field of knowledge. The purpose of this paper is to explore the tag relations of user in...
Joohee Bae, Kyungwon Lee
COMPSAC
2010
IEEE
14 years 9 months ago
Team Factors and Failure Processing Efficiency: An Exploratory Study of Closed and Open Source Software Development
Researchers in the field of software engineering economics have associated team factors, such as team size and team experience, with productivity and quality. Since distributed and...
Michael Grottke, Lars M. Karg, Arne Beckhaus
JIPS
2010
154views more  JIPS 2010»
14 years 6 months ago
Mining Spatio-Temporal Patterns in Trajectory Data
Spatio-temporal patterns extracted from historical trajectories of moving objects reveal important knowledge about movement behavior for high quality LBS services. Existing approac...
Juyoung Kang 0002, Hwan-Seung Yong