Sciweavers

1444 search results - page 154 / 289
» The end of users
Sort
View
HICSS
2010
IEEE
180views Biometrics» more  HICSS 2010»
15 years 5 months ago
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While m...
Craig A. Shue, Minaxi Gupta
PERVASIVE
2009
Springer
15 years 4 months ago
Realistic Driving Trips For Location Privacy
Simulated, false location reports can be an effective way to confuse a privacy attacker. When a mobile user must transmit his or her location to a central server, these location re...
John Krumm
EUROMICRO
2009
IEEE
15 years 4 months ago
An Architecture-Based Framework for Managing Adaptive Real-Time Applications
—Real-time systems are increasingly used in dynamic changing environments with variable user needs, hosting real-time applications ranging in number and nature. This paper propos...
Ning Gui, Vincenzo De Florio, Hong Sun, Chris Blon...
ICANNGA
2009
Springer
133views Algorithms» more  ICANNGA 2009»
15 years 4 months ago
Visualizing Time Series State Changes with Prototype Based Clustering
Modern process and condition monitoring systems produce a huge amount of data which is hard to analyze manually. Previous analyzing techniques disregard time information and concen...
Markus Pylvänen, Sami Äyrämö, ...
ICCS
2009
Springer
15 years 4 months ago
Querying for Feature Extraction and Visualization in Climate Modeling
The ultimate goal of data visualization is to clearly portray features relevant to the problem being studied. This goal can be realized only if users can effectively communicate t...
C. Ryan Johnson, Markus Glatter, Wesley Kendall, J...