Sciweavers

300 search results - page 24 / 60
» A study on the value of location privacy
Sort
View
COMPSAC
2008
IEEE
14 years 2 months ago
Debugging through Evaluation Sequences: A Controlled Experimental Study
Predicate-based statistical fault-localization techniques locate fault-relevant predicates in a program by contrasting the statistics of the values of individual predicates betwee...
Zhenyu Zhang, Bo Jiang, W. K. Chan, T. H. Tse
HM
2007
Springer
137views Optimization» more  HM 2007»
14 years 1 months ago
A Hybrid VNS for Connected Facility Location
The connected facility location (ConFL) problem generalizes the facility location problem and the Steiner tree problem in graphs. Given a graph G = (V, E), a set of customers D ⊆...
Ivana Ljubic
CORR
2007
Springer
217views Education» more  CORR 2007»
13 years 7 months ago
Hard constraint satisfaction problems have hard gaps at location 1
An instance of the maximum constraint satisfaction problem (Max CSP) is a nite collection of constraints on a set of variables, and the goal is to assign values to the variables ...
Peter Jonsson, Andrei A. Krokhin, Fredrik Kuivinen
SOUPS
2010
ACM
13 years 11 months ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...
MCFNS
2010
168views more  MCFNS 2010»
13 years 2 months ago
Evaluating TIFFS (Toolbox for LiDAR Data Filtering and Forest Studies) in Deriving Forest Measurements from LiDAR Data
Recent advances in LiDAR (Light Detection and Ranging) technology have allowed for the remote sensing of important forest characteristics to be more reliable and commercially avail...
John Chapman, I.-Kuai Hung, Jeff Tippen