Sciweavers

2135 search results - page 160 / 427
» Applications and Issues in Pen-Centric Computing
Sort
View
VLDB
2006
ACM
122views Database» more  VLDB 2006»
14 years 9 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
PERCOM
2004
ACM
14 years 8 months ago
A Middleware for Supporting Disconnections and Multi-Network Access in Mobile Environments
The middleware infrastructure to support applications is becoming critically important to the new horizons of mobile and pervasive computing. In this context, the goal of our work...
Mejdi Kaddour, Laurent Pautet
IPOM
2009
Springer
14 years 3 months ago
Traffic Classification Based on Flow Similarity
Due to the various masquerading strategies adopted by newer P2P applications to avoid detection and filtering, well-known port mapping techniques cannot guarantee their accuracy an...
Jae Yoon Chung, Byungchul Park, Young J. Won, John...
AINA
2008
IEEE
14 years 3 months ago
Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region Analysis
With quick evolution of grid technologies and increasing complexity of e-Science applications, reasoning temporal properties of grid workflows to ensure reliability and trustworth...
Ke Xu, Junwei Cao, Lianchen Liu, Cheng Wu
ICPR
2008
IEEE
14 years 3 months ago
A novel robust kernel for appearance-based learning
Robustness is one of the most critical issues in the appearance-based learning strategies. In this work, we propose a novel kernel that is robust against data corruption for vario...
Chia-Te Liao, Shang-Hong Lai