Sciweavers

8600 search results - page 1385 / 1720
» Measuring with Timed Patterns
Sort
View
CCS
2007
ACM
15 years 10 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
CIKM
2007
Springer
15 years 10 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
CLEF
2007
Springer
15 years 10 months ago
Overview of the CLEF-2007 Cross-Language Speech Retrieval Track
The CLEF-2007 Cross-Language Speech Retrieval (CL-SR) track included two tasks: to identify topically coherent segments of English interviews in a known-boundary condition, and to...
Pavel Pecina, Petra Hoffmannová, Gareth J. ...
CP
2007
Springer
15 years 10 months ago
Model-Driven Visualizations of Constraint-Based Local Search
Visualization is often invaluable to understand the behavior of optimization algorithms, identify their bottlenecks or pathological behaviors, and suggest remedial techniques. Yet ...
Grégoire Dooms, Pascal Van Hentenryck, Laur...
CPM
2007
Springer
102views Combinatorics» more  CPM 2007»
15 years 10 months ago
Non-breaking Similarity of Genomes with Gene Repetitions
Abstract. In this paper we define a new similarity measure, the nonbreaking similarity, which is the complement of the famous breakpoint distance between genomes (in general, betw...
Zhixiang Chen, Bin Fu, Jinhui Xu, Bo-Ting Yang, Zh...
« Prev « First page 1385 / 1720 Last » Next »