Sciweavers

9133 search results - page 1780 / 1827
» Modelling perception using image processing algorithms
Sort
View
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
16 years 2 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
KDD
2009
ACM
169views Data Mining» more  KDD 2009»
15 years 9 months ago
On burstiness-aware search for document sequences
As the number and size of large timestamped collections (e.g. sequences of digitized newspapers, periodicals, blogs) increase, the problem of efficiently indexing and searching su...
Theodoros Lappas, Benjamin Arai, Manolis Platakis,...
156
Voted
LOCA
2009
Springer
15 years 8 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung
IROS
2007
IEEE
172views Robotics» more  IROS 2007»
15 years 8 months ago
Motor control optimization of compliant one-legged locomotion in rough terrain
— While underactuated robotic systems are capable of energy efficient and rapid dynamic behavior, we still do not fully understand how body dynamics can be actively used for ada...
Fumiya Iida, Russ Tedrake
140
Voted
ISCC
2007
IEEE
164views Communications» more  ISCC 2007»
15 years 8 months ago
DTSN: Distributed Transport for Sensor Networks
: This paper presents the Distributed Transport for Sensor Networks (DTSN), a novel reliable transport protocol for convergecast and unicast communications in Wireless Sensor Netwo...
Bruno Marchi, António Grilo, Mário S...
« Prev « First page 1780 / 1827 Last » Next »