Sciweavers

901 search results - page 72 / 181
» On Anonymization of String Data
Sort
View
GIS
2008
ACM
16 years 2 months ago
Privacy: preserving trajectory collection
In order to provide context?aware Location?Based Services, real location data of mobile users must be collected and analyzed by spatio?temporal data mining methods. However, the d...
Gyözö Gidófalvi, Torben Bach Pede...
ADC
2010
Springer
204views Database» more  ADC 2010»
14 years 8 months ago
Systematic clustering method for l-diversity model
Nowadays privacy becomes a major concern and many research efforts have been dedicated to the development of privacy protecting technology. Anonymization techniques provide an eff...
Md. Enamul Kabir, Hua Wang, Elisa Bertino, Yunxian...
CIKM
1997
Springer
15 years 5 months ago
Applications of Approximate Word Matching in Information Retrieval
As more online databases are integrated into digital libraries, the issue of quality control of the data becomes increasingly important, especially as it relates to the effective ...
James C. French, Allison L. Powell, Eric Schulman
DAWAK
2007
Springer
15 years 5 months ago
An Efficient Algorithm for Identifying the Most Contributory Substring
Abstract. Detecting repeated portions of strings has important applications to many areas of study including data compression and computational biology. This paper defines and pres...
Ben Stephenson
AMDO
2006
Springer
15 years 5 months ago
Action Recognition Using Motion Primitives and Probabilistic Edit Distance
In this paper we describe a recognition approach based on the notion of primitives. As opposed to recognizing actions based on temporal trajectories or temporal volumes, primitive-...
Preben Fihl, Michael B. Holte, Thomas B. Moeslund,...