Sciweavers

300 search results - page 51 / 60
» A study on the value of location privacy
Sort
View
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 2 months ago
Robust Matrix Completion with Corrupted Columns
This paper considers the problem of matrix completion, when some number of the columns are arbitrarily corrupted, potentially by a malicious adversary. It is well-known that stand...
Yudong Chen, Huan Xu, Constantine Caramanis, Sujay...
TMC
2011
164views more  TMC 2011»
13 years 2 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
AINA
2010
IEEE
14 years 19 days ago
CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications
—Advances in Cloud computing enable new possibilities to Internet applications developers. Previously, the main concern of Internet applications developers was deployment and hos...
Bhathiya Wickremasinghe, Rodrigo N. Calheiros, Raj...
BMCBI
2006
126views more  BMCBI 2006»
13 years 7 months ago
Effect of data normalization on fuzzy clustering of DNA microarray data
Background: Microarray technology has made it possible to simultaneously measure the expression levels of large numbers of genes in a short time. Gene expression data is informati...
Seo Young Kim, Jae Won Lee, Jong Sung Bae
ICIP
2007
IEEE
14 years 1 months ago
Early Termination Algorithms for Correlation Coefficient Based Block Matching
Block based motion compensation techniques make frequent use of Early Termination Algorithms (ETA) to reduce the computational cost of block matching process. ETAs have been well ...
Arif Mahmood, Sohaib Khan