In this paper we extend the notion of k-anonymity in the context of databases with timestamped information in order to naturally define k-anonymous views of temporal data. We als...
Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wa...
Share and reuse of learning objects are an important issue, that are not solved by simply adding a metadata description. Their contextualisation as well as their level of granular...
Emmanuel Fernandes, Hend Madhour, Sami Miniaoui, M...
Channel-aware scheduling and link adaptation (LA) methods are widely considered to be crucial for realizing high data rates in wireless networks. Multi-carrier systems that spread...
— Future wireless communication systems require highly efficient use of radio parameters. Adaptability to changing environment conditions and to service application requirements ...
In multi-target tracking, the maintaining of the correct identity of targets is challenging. In the presented tracking method, accurate target identification is achieved by incor...