Sciweavers

901 search results - page 99 / 181
» On Anonymization of String Data
Sort
View
TCS
2008
15 years 1 months ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
PAM
2011
Springer
14 years 4 months ago
Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors
1 The arms race between copyright agencies and P2P users is an ongoing and evolving struggle. On the one hand, content providers are using several techniques to stealthily find un...
Rahul Potharaju, Jeff Seibert, Sonia Fahmy, Cristi...
COMSNETS
2012
183views more  COMSNETS 2012»
13 years 9 months ago
Effects of network trace sampling methods on privacy and utility metrics
—Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of iden...
Phil Fazio, Keren Tan, David Kotz
JSS
2006
132views more  JSS 2006»
15 years 1 months ago
FMF: Query adaptive melody retrieval system
Recent progress of computer and network technologies makes it possible to store and retrieve a large volume of multimedia data in many applications. In such applications, efficien...
Seungmin Rho, Eenjun Hwang
ACL
2012
13 years 3 months ago
How Are Spelling Errors Generated and Corrected? A Study of Corrected and Uncorrected Spelling Errors Using Keystroke Logs
This paper presents a comparative study of spelling errors that are corrected as you type, vs. those that remain uncorrected. First, we generate naturally occurring online error c...
Yukino Baba, Hisami Suzuki