Sciweavers

9133 search results - page 1780 / 1827
» Modelling perception using image processing algorithms
Sort
View
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
16 years 5 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
KDD
2009
ACM
169views Data Mining» more  KDD 2009»
16 years 7 days ago
On burstiness-aware search for document sequences
As the number and size of large timestamped collections (e.g. sequences of digitized newspapers, periodicals, blogs) increase, the problem of efficiently indexing and searching su...
Theodoros Lappas, Benjamin Arai, Manolis Platakis,...
LOCA
2009
Springer
16 years 11 hour ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung
IROS
2007
IEEE
172views Robotics» more  IROS 2007»
15 years 11 months ago
Motor control optimization of compliant one-legged locomotion in rough terrain
— While underactuated robotic systems are capable of energy efficient and rapid dynamic behavior, we still do not fully understand how body dynamics can be actively used for ada...
Fumiya Iida, Russ Tedrake
ISCC
2007
IEEE
164views Communications» more  ISCC 2007»
15 years 11 months ago
DTSN: Distributed Transport for Sensor Networks
: This paper presents the Distributed Transport for Sensor Networks (DTSN), a novel reliable transport protocol for convergecast and unicast communications in Wireless Sensor Netwo...
Bruno Marchi, António Grilo, Mário S...
« Prev « First page 1780 / 1827 Last » Next »