Sciweavers

1466 search results - page 274 / 294
» ABL: Alignment-Based Learning
Sort
View
PODS
2003
ACM
156views Database» more  PODS 2003»
14 years 9 months ago
Limiting privacy breaches in privacy preserving data mining
There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One app...
Alexandre V. Evfimievski, Johannes Gehrke, Ramakri...
MOBISYS
2008
ACM
14 years 9 months ago
Sixthsense: rfid-based enterprise intelligence
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
WWW
2010
ACM
14 years 4 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
TEI
2010
ACM
179views Hardware» more  TEI 2010»
14 years 4 months ago
Feeling the beat where it counts: fostering multi-limb rhythm skills with the haptic drum kit
This paper introduces a tool known as the Haptic Drum Kit, which employs four computer-controlled vibrotactile devices, one attached to each wrist and ankle. In the applications d...
Simon Holland, Anders J. Bouwer, Mathew Dalgelish,...
TMA
2010
Springer
314views Management» more  TMA 2010»
14 years 4 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...