Sciweavers

1541 search results - page 257 / 309
» Learning to Diagnose by Doing
Sort
View
IEEESP
2010
126views more  IEEESP 2010»
14 years 8 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
IJSR
2010
169views more  IJSR 2010»
14 years 8 months ago
A Component-Based Approach to Visual Person Tracking from a Mobile Platform
Abstract In this article, we present a component-based visual tracker for mobile platforms with an application to person tracking. The core of the technique is a componentbased des...
Simone Frintrop, Achim Königs, Frank Hoeller,...
INFOCOM
2010
IEEE
14 years 8 months ago
Distributed Algorithms for Approximating Wireless Network Capacity
—In this paper we consider the problem of maximizing wireless network capacity (a.k.a. one-shot scheduling) in both the protocol and physical models. We give the first distribut...
Michael Dinitz
SAC
2008
ACM
14 years 8 months ago
Data sharing vs. message passing: synergy or incompatibility?: an implementation-driven case study
One reasonable categorization of coordination models is into data sharing or message passing, based on whether the information necessary to coordination is persistently stored and...
Matteo Ceriotti, Amy L. Murphy, Gian Pietro Picco
MIDDLEWARE
2010
Springer
14 years 8 months ago
The Gossple Anonymous Social Network
While social networks provide news from old buddies, you can learn a lot more from people you do not know, but with whom you share many interests. We show in this paper how to bui...
Marin Bertier, Davide Frey, Rachid Guerraoui, Anne...