Sciweavers

1096 search results - page 182 / 220
» Evaluating Algorithms for Concept Description
Sort
View
169
Voted
LOCA
2009
Springer
15 years 10 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung
128
Voted
SEMWEB
2009
Springer
15 years 10 months ago
Executing SPARQL Queries over the Web of Linked Data
The Web of Linked Data forms a single, globally distributed dataspace. Due to the openness of this dataspace, it is not possible to know in advance all data sources that might be r...
Olaf Hartig, Christian Bizer, Johann Christoph Fre...
137
Voted
GLOBECOM
2008
IEEE
15 years 10 months ago
Collusion-Resistant Multi-Winner Spectrum Auction for Cognitive Radio Networks
—In order to fully utilize spectrum, auction-based dynamic spectrum allocation has become a promising approach which allows unlicensed wireless users to lease unused bands from s...
Yongle Wu, Beibei Wang, K. J. Ray Liu, T. Charles ...
124
Voted
ICDM
2008
IEEE
146views Data Mining» more  ICDM 2008»
15 years 10 months ago
Isolation Forest
Most existing model-based approaches to anomaly detection construct a profile of normal instances, then identify instances that do not conform to the normal profile as anomalies...
Fei Tony Liu, Kai Ming Ting, Zhi-Hua Zhou
143
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Maximizing Resilient Throughput in Peer-to-Peer Network: A Generalized Flow Approach
—A unique challenge in P2P network is that the peer dynamics (departure or failure) cause unavoidable disruption to the downstream peers. While many works have been dedicated to ...
Bin Chang, Yi Cui, Yuan Xue