Sciweavers

1316 search results - page 55 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
MOBISYS
2008
ACM
14 years 8 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
AINA
2009
IEEE
14 years 2 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
AIMS
2009
Springer
14 years 3 months ago
Knowledge Management and Promises
Ontological modelling for machine inference has featured prominently in IT management research recently, but there is more immediate scope for knowledge modelling in the realm of h...
Mark Burgess
CIKM
2006
Springer
14 years 29 days ago
Constrained subspace skyline computation
In this paper we introduce the problem of Constrained Subspace Skyline Queries. This class of queries can be thought of as a generalization of subspace skyline queries using range...
Evangelos Dellis, Akrivi Vlachou, Ilya Vladimirski...
BMCBI
2005
246views more  BMCBI 2005»
13 years 9 months ago
ParPEST: a pipeline for EST data analysis based on parallel computing
Background: Expressed Sequence Tags (ESTs) are short and error-prone DNA sequences generated from the 5' and 3' ends of randomly selected cDNA clones. They provide an im...
Nunzio D'Agostino, Mario Aversano, Maria Luisa Chi...