Sciweavers

349 search results - page 47 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
ESORICS
2009
Springer
14 years 3 months ago
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services
Abstract. The ubiquity of smartphones and other location-aware handheld devices has resulted in a dramatic increase in popularity of locationbased services (LBS) tailored to user l...
Ali Khoshgozaran, Cyrus Shahabi
SAC
2010
ACM
14 years 3 months ago
Hypothesis generation and ranking based on event similarities
Accelerated by the technological advances in the domain, the size of the biomedical literature has been growing rapidly. As a result, it is not feasible for individual researchers...
Taiki Miyanishi, Kazuhiro Seki, Kuniaki Uehara
IJRR
2008
242views more  IJRR 2008»
13 years 8 months ago
Bilateral Symmetry Detection for Real-time Robotics Applications
Bilateral symmetry is a salient visual feature of many man-made objects. In this paper, we present research that use bilateral symmetry to identify, segment and track objects in re...
Wai Ho Li, Alan M. Zhang, Lindsay Kleeman
JSSPP
2009
Springer
14 years 3 months ago
Modeling Parallel System Workloads with Temporal Locality
In parallel systems, similar jobs tend to arrive within bursty periods. This fact leads to the existence of the locality phenomenon, a persistent similarity between nearby jobs, in...
Tran Ngoc Minh, Lex Wolters
IWCMC
2006
ACM
14 years 2 months ago
What does using TCP as an evaluation tool reveal about MANET routing protocols?
Past research studying the operations of TCP over wireless/mobile ad hoc networks has shown that TCP cannot be adopted as-is for use in mobile ad hoc networks (MANET) to achieve r...
Sundaram Rajagopalan, Chien-Chung Shen