Sciweavers

464 search results - page 69 / 93
» Identity Management
Sort
View
LOCA
2009
Springer
14 years 2 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung
SIGECOM
2009
ACM
139views ECommerce» more  SIGECOM 2009»
14 years 2 months ago
Simple versus optimal mechanisms
The monopolist’s theory of optimal single-item auctions for agents with independent private values can be summarized by two statements. The first is from Myerson [8]: the optim...
Jason D. Hartline, Tim Roughgarden
VRML
2009
ACM
14 years 2 months ago
Interactive stories on the net: a model and an architecture for X3D worlds
This work discusses a model and an architecture for interactive stories to be displayed on the net, designed for being independent from the specific story represented and suitabl...
Efrem Carnielli, Fabio Pittarello
IPSN
2010
Springer
14 years 2 months ago
A vehicular surveillance and sensing system for car security and tracking applications
In this paper, we propose a Vehicular Surveillance and Sensing System (VS3 ), which targets at car security and tracking applications. VS3 can be triggered by events detected insi...
Lien-Wu Chen, Kun-Ze Syue, Yu-Chee Tseng
ICASSP
2008
IEEE
14 years 2 months ago
Single-channel speech separation based on modulation frequency
This paper describes an algorithm that performs a simple form of computational auditory scene analysis to separate multiple speech signals from one another on the basis of the mod...
Lingyun Gu, Richard M. Stern