Sciweavers

570 search results - page 83 / 114
» The Uniqueness of Changes: Characteristics and Applications
Sort
View
104
Voted
EXPERT
2006
156views more  EXPERT 2006»
15 years 14 days ago
Computational Models of Ethical Reasoning: Challenges, Initial Steps, and Future Directions
on abstract principles that you can't easily apply in a formal, deductive fashion. So, the favorite tools of logicians and mathematicians, such as firstorder logic, aren'...
Bruce M. McLaren
TMC
2008
159views more  TMC 2008»
14 years 11 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
SRDS
2010
IEEE
14 years 10 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
SIGMOD
2012
ACM
253views Database» more  SIGMOD 2012»
13 years 2 months ago
Skew-aware automatic database partitioning in shared-nothing, parallel OLTP systems
The advent of affordable, shared-nothing computing systems portends a new class of parallel database management systems (DBMS) for on-line transaction processing (OLTP) applicatio...
Andrew Pavlo, Carlo Curino, Stanley B. Zdonik
IPSN
2007
Springer
15 years 6 months ago
Design and implementation of a wireless sensor network for intelligent light control
We present the design and implementation of the Illuminator, a preliminary sensor network-based intelligent light control system for entertainment and media production. Unlike mos...
Heemin Park, Jeff Burke, Mani B. Srivastava