Sciweavers

42 search results - page 6 / 9
» Exploiting online sources to accurately geocode addresses
Sort
View
WWW
2009
ACM
14 years 8 months ago
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an...
Elena Zheleva, Lise Getoor
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
14 years 8 months ago
Density-based clustering for real-time stream data
Existing data-stream clustering algorithms such as CluStream are based on k-means. These clustering algorithms are incompetent to find clusters of arbitrary shapes and cannot hand...
Yixin Chen, Li Tu
AAIM
2007
Springer
142views Algorithms» more  AAIM 2007»
13 years 12 months ago
Design of a Fuzzy PI Controller to Guarantee Proportional Delay Differentiation on Web Servers
PI controller has attracted researchers in industrial control processes because of its simplicity and robust performance in a wide range of operating conditions. It has been used t...
Ka Ho Chan, Xiaowen Chu
ICMCS
2005
IEEE
183views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Bandwidth Estimation and Robust Video Streaming Over 802.11E Wireless Lans
Streaming high quality audio/video (AV) from home media sources to TV sets over a wireless local area network (WLAN) is a challenging problem because of the fluctuating bandwidth...
Mehmet Umut Demircin, Peter van Beek
JGTOOLS
2006
107views more  JGTOOLS 2006»
13 years 7 months ago
Efficient Shadows for Sampled Environment Maps
This paper addresses the problem of efficiently calculating shadows from environment maps in the context of ray-tracing. Since accurate rendering of shadows from environment maps ...
Aner Ben-Artzi, Ravi Ramamoorthi, Maneesh Agrawala