Sciweavers

5758 search results - page 1028 / 1152
» Anonymity-preserving data collection
Sort
View
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 4 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
MDM
2009
Springer
133views Communications» more  MDM 2009»
14 years 4 months ago
YushanNet: A Delay-Tolerant Wireless Sensor Network for Hiker Tracking in Yushan National Park
The objective of YushanNet is to provide a reliable and robust system for hiker tracking in Yushan National Park, Taiwan. The aggregated information can help national parks to pro...
Yu-Te Huang, Yi-Chao Chen, Jyh-How Huang, Ling-Jyh...
PPDP
2009
Springer
14 years 4 months ago
Path-sensitive region analysis for mercury programs
Dividing the heap memory of programs into regions is the starting point of region-based memory management. In our existing work of enabling region-based memory management for Merc...
Quan Phan, Gerda Janssens
GROUP
2009
ACM
14 years 4 months ago
Toward technologies that support family reflections on health
Previous research has explored how technology can motivate healthy living in social groups such as friends and coworkers. However, little research has focused on the implications ...
Andrea Grimes, Desney S. Tan, Dan Morris
RECSYS
2009
ACM
14 years 4 months ago
Harnessing the power of "favorites" lists for recommendation systems
We propose a novel collaborative recommendation approach to take advantage of the information available in user-created lists. Our approach assumes associations among any two item...
Maryam Khezrzadeh, Alex Thomo, William W. Wadge
« Prev « First page 1028 / 1152 Last » Next »