Sciweavers

557 search results - page 69 / 112
» Two experiences designing for effective security
Sort
View
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 6 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
ICRA
2008
IEEE
132views Robotics» more  ICRA 2008»
15 years 6 months ago
The OmniTread OT-4 serpentine robot
Serpentine robots are slender, multi-segmented vehicles designed to provide greater mobility than conventional mobile robots. Serpentine robots are ideally suited for urban search...
Johann Borenstein, Adam Borrell
PET
2010
Springer
15 years 3 months ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...
VIS
2009
IEEE
154views Visualization» more  VIS 2009»
16 years 1 months ago
A User Study to Compare Four Uncertainty Visualization Methods for 1D and 2D Datasets
Many techniques have been proposed to show uncertainty in data visualizations. However, very little is known about their effectiveness in conveying meaningful information. In this ...
Jibonananda Sanyal, Song Zhang, Gargi Bhattachar...
IPSN
2005
Springer
15 years 5 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du