Sciweavers

1810 search results - page 278 / 362
» Similarity estimation techniques from rounding algorithms
Sort
View
WASA
2009
Springer
107views Algorithms» more  WASA 2009»
15 years 4 months ago
Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
Abstract. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target be a malicious d...
Christine Laurendeau, Michel Barbeau
ICDE
2010
IEEE
184views Database» more  ICDE 2010»
15 years 2 months ago
On optimal anonymization for l+-diversity
-- Publishing person specific data while protecting privacy is an important problem. Existing algorithms that enforce the privacy principle called l-diversity are heuristic based d...
Junqiang Liu, Ke Wang
ICRA
2010
IEEE
145views Robotics» more  ICRA 2010»
14 years 8 months ago
Visual odometry priors for robust EKF-SLAM
— One of the main drawbacks of standard visual EKF-SLAM techniques is the assumption of a general camera motion model. Usually this motion model has been implemented in the liter...
Pablo Fernández Alcantarilla, Luis Miguel B...
CCS
2010
ACM
14 years 7 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
IDA
2002
Springer
14 years 9 months ago
Classification and filtering of spectra: A case study in mineralogy
The ability to identify the mineral composition of rocks and soils is an important tool for the exploration of geological sites. Even though expert knowledge is commonly used for t...
Jonathan Moody, Ricardo Bezerra de Andrade e Silva...