Sciweavers

3395 search results - page 615 / 679
» Designs, Disputes and Strategies
Sort
View
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 10 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
ICDE
2006
IEEE
206views Database» more  ICDE 2006»
14 years 10 months ago
Query Co-Processing on Commodity Hardware
The rapid increase in the data volumes for the past few decades has intensified the need for high processing power for database and data mining applications. Researchers have acti...
Anastassia Ailamaki, Naga K. Govindaraju, Dinesh M...
VIS
2007
IEEE
101views Visualization» more  VIS 2007»
14 years 10 months ago
Random-Accessible Compressed Triangle Meshes
With the exponential growth in size of geometric data, it is becoming increasingly important to make effective use of multilevel caches, limited disk storage, and bandwidth. As a r...
Sung-Eui Yoon, Peter Lindstrom
ICPR
2006
IEEE
14 years 10 months ago
Bayesian Imitation of Human Behavior in Interactive Computer Games
Modern interactive computer games provide the ability to objectively record complex human behavior, offering a variety of interesting challenges to the pattern-recognition communi...
Bernard Gorman, Christian Bauckhage, Christian Thu...
GIS
2003
ACM
14 years 10 months ago
A predictive location model for location-based services
Location-Based Services (LBSs) utilize information about users' locations through location-aware mobile devices to provide services, such as nearest features of interest, the...
Hassan A. Karimi, Xiong Liu