Sciweavers

2880 search results - page 19 / 576
» Types are calling conventions
Sort
View
ICDE
2008
IEEE
177views Database» more  ICDE 2008»
16 years 1 months ago
On Anti-Corruption Privacy Preserving Publication
This paper deals with a new type of privacy threat, called "corruption", in anonymized data publication. Specifically, an adversary is said to have corrupted some individ...
Yufei Tao, Xiaokui Xiao, Jiexing Li, Donghui Zhang
ICIP
2009
IEEE
16 years 25 days ago
Face Recognition With Salient Local Gradient Orientation Binary Patterns
This paper proposes a new face recognition method. There are two novelties in the proposed method. First, a new saliency measure function is designed to detect the most salient re...
ICC
2009
IEEE
159views Communications» more  ICC 2009»
15 years 6 months ago
An Enhanced Multiple-Feedback Algorithm for RFID MAC Protocols
Abstract— This paper introduces two new tree-based anticollision schemes using multiple feedback symbols for uplink tag random access of emerging radio frequency identification (...
You-Chang Ko, Sumit Roy, Choong-Ho Cho, Hyong-Woo ...
COSIT
2005
Springer
95views GIS» more  COSIT 2005»
15 years 5 months ago
Simulation of Obfuscation and Negotiation for Location Privacy
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
Matt Duckham, Lars Kulik
HCI
2007
15 years 1 months ago
The BIC Model: A Blueprint for the Communicator
In this paper, we outline a cognitive architecture for communicators, called the BIC model. The model consist of three main components. First, a (B)iological component, in which th...
Jan Peter de Ruiter, Nicholas J. Enfield