Sciweavers

87 search results - page 17 / 18
» Anonymized Data: Generation, models, usage
Sort
View
WWW
2005
ACM
14 years 8 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani
CVPR
2007
IEEE
14 years 9 months ago
3D Pose Estimation Based on Multiple Monocular Cues
In this study we propose an integrated approach to the problem of 3D pose estimation. The main difference to the majority of known methods is the usage of complementary image info...
Björn Barrois, Christian Wöhler
ESWS
2009
Springer
14 years 2 months ago
ONKI SKOS Server for Publishing and Utilizing SKOS Vocabularies and Ontologies as Services
Vocabularies are the building blocks of the Semantic Web providing shared terminological resources for content indexing, information retrieval, data exchange, and content integrati...
Jouni Tuominen, Matias Frosterus, Kim Viljanen, Ee...
VLDB
2005
ACM
96views Database» more  VLDB 2005»
14 years 1 months ago
Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype
Radio Frequency Identification (RFID) based item-level tracking holds the promise of revolutionizing supply-chain, retail store, and asset management applications. However, the hi...
Ying Hu, Seema Sundara, Timothy Chorma, Jagannatha...
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin