Sciweavers

466 search results - page 75 / 94
» Critical Reasoning
Sort
View
TMC
2012
11 years 11 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
CHI
2005
ACM
14 years 9 months ago
Digital Family Portrait Field Trial: Support for Aging in Place
A growing social problem in the U.S., and elsewhere, is enabling older adults to continue living independently, as opposed to moving to an institutional care setting. One key part...
Jim Rowan, Elizabeth D. Mynatt
WWW
2003
ACM
14 years 9 months ago
Efficient URL caching for world wide web crawling
Crawling the web is deceptively simple: the basic algorithm is (a) Fetch a page (b) Parse it to extract all linked URLs (c) For all the URLs not seen before, repeat (a)?(c). Howev...
Andrei Z. Broder, Marc Najork, Janet L. Wiener
MM
1993
ACM
105views Multimedia» more  MM 1993»
14 years 20 days ago
Synchronous Bandwidth Allocation in FDDI Networks
It is well-known that an FDDI token ring network provides a guaranteed throughput for synchronous messages and a bounded medium access delay for each node/station. However, this f...
Qin Zheng, Kang G. Shin
KDD
2005
ACM
137views Data Mining» more  KDD 2005»
14 years 9 months ago
A generalized framework for mining spatio-temporal patterns in scientific data
In this paper, we present a general framework to discover spatial associations and spatio-temporal episodes for scientific datasets. In contrast to previous work in this area, fea...
Hui Yang, Srinivasan Parthasarathy, Sameep Mehta