Sciweavers

3639 search results - page 579 / 728
» Provenance as Dependency Analysis
Sort
View
80
Voted
SPAA
2010
ACM
15 years 5 months ago
Collaborative scoring with dishonest participants
Consider a set of players that are interested in collectively evaluating a set of objects. We develop a collaborative scoring protocol in which each player evaluates a subset of t...
Seth Gilbert, Rachid Guerraoui, Faezeh Malakouti R...
182
Voted
MDM
2010
Springer
301views Communications» more  MDM 2010»
15 years 5 months ago
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
96
Voted
CDC
2009
IEEE
142views Control Systems» more  CDC 2009»
15 years 5 months ago
Towards STEM control: Modeling framework and development of a sensor for defocus control
— Scanning transmission electron microscopes are indispensable tools for material science research, since they can reveal the internal structure of a wide range of specimens. Thu...
Arturo Tejada, Wouter Van den Broek, Saartje W. va...
COMPGEOM
2009
ACM
15 years 5 months ago
Kinetic spanners in Rd
We present a new (1 + ε)-spanner for sets of n points in Rd . Our spanner has size O(n/εd−1 ) and maximum degree O(logd n). The main advantage of our spanner is that it can be...
Mohammad Ali Abam, Mark de Berg
104
Voted
HPCC
2009
Springer
15 years 5 months ago
Load Scheduling Strategies for Parallel DNA Sequencing Applications
This paper studies a load scheduling strategy with nearoptimal processing time leveraging the computational characteristics of parallel DNA sequence alignment algorithms, specific...
Sudha Gunturu, Xiaolin Li, Laurence Tianruo Yang