Sciweavers

3395 search results - page 596 / 679
» Computational Differential Privacy
Sort
View
117
Voted
DUX
2007
15 years 7 months ago
180 x 120: designing alternate location systems
Using 180 RFID tags to track and plot locations over time, guests to an event at the San Francisco Museum of Modern Art (SFMOMA) collectively constructed a public visualization of...
Eric Paulos, Anthony Burke, Tom Jenkins, Karen Mar...
139
Voted
GROUP
2007
ACM
15 years 7 months ago
Searching for experts in the enterprise: combining text and social network analysis
Employees depend on other people in the enterprise for rapid access to important information. But current systems for finding experts do not adequately address the social implicat...
Kate Ehrlich, Ching-Yung Lin, Vicky Griffiths-Fish...
123
Voted
ICDCS
2010
IEEE
15 years 7 months ago
Fingerprinting Mobile User Positions in Sensor Networks
- We demonstrate that the network flux over the sensor network provides us fingerprint information about the mobile users within the field. Such information is exoteric in the phys...
Mo Li, Xiaoye Jiang, Leonidas J. Guibas
120
Voted
AINA
2010
IEEE
15 years 7 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores
PERVASIVE
2010
Springer
15 years 7 months ago
Object-Based Activity Recognition with Heterogeneous Sensors on Wrist
Abstract. This paper describes how we recognize activities of daily living (ADLs) with our designed sensor device, which is equipped with heterogeneous sensors such as a camera, a ...
Takuya Maekawa, Yutaka Yanagisawa, Yasue Kishino, ...