Sciweavers

298 search results - page 26 / 60
» Computer security: quality rather than quantity
Sort
View
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
14 years 10 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
BROADNETS
2007
IEEE
14 years 4 months ago
Pricing spectrum access in cellular CDMA networks with heterogeneous demand
—We consider pricing secondary access to wireless spectrum in cellular CDMA networks. We study the case for a primary license holder interested in leasing the right of providing ...
Ashraf Al Daoud, Murat Alanyali, David Starobinski
VISUALIZATION
2002
IEEE
14 years 2 months ago
PMR: Point to Mesh Rendering, A Feature-Based Approach
Within the field of computer graphics and visualization, it is often necessary to visualize polygonal models with large number of polygons. Display quality is mandatory, but it i...
Tamal K. Dey, James Hudson
VLDB
2005
ACM
151views Database» more  VLDB 2005»
14 years 3 months ago
On Map-Matching Vehicle Tracking Data
Vehicle tracking data is an essential “raw” material for a broad range of applications such as traffic management and control, routing, and navigation. An important issue with...
Sotiris Brakatsoulas, Dieter Pfoser, Randall Salas...
ESORICS
2004
Springer
14 years 3 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...