Sciweavers

5723 search results - page 1097 / 1145
» Network Management
Sort
View
85
Voted
CORR
2012
Springer
227views Education» more  CORR 2012»
13 years 6 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
67
Voted
KCAP
2005
ACM
15 years 4 months ago
An instance mapping ontology for the semantic web
Semantic data transformation plays an important role in realizing the vision of the semantic web. It supports the transformation of data in different representations into ontologi...
Yuangui Lei
ECCV
2008
Springer
16 years 25 days ago
FaceTracer: A Search Engine for Large Collections of Images with Faces
We have created the first image search engine based entirely on faces. Using simple text queries such as "smiling men with blond hair and mustaches," users can search thr...
Neeraj Kumar, Peter N. Belhumeur, Shree K. Nayar
WWW
2003
ACM
15 years 11 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
115
Voted
INFOCOM
2009
IEEE
15 years 5 months ago
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Abstract—Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed arc...
Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang
« Prev « First page 1097 / 1145 Last » Next »