Sciweavers

39039 search results - page 7671 / 7808
» Implementation of the
Sort
View
TMC
2008
159views more  TMC 2008»
13 years 7 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
JFP
2010
107views more  JFP 2010»
13 years 7 months ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan
JIDM
2010
155views more  JIDM 2010»
13 years 7 months ago
DeweyIDs - The Key to Fine-Grained Management of XML Documents
Because XML documents tend to be very large and are more and more collaboratively processed, their fine-grained storage and management is a must for which, in turn, a flexible tree...
Michael Peter Haustein, Theo Härder, Christia...
JIDM
2010
160views more  JIDM 2010»
13 years 7 months ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo
JOCN
2010
71views more  JOCN 2010»
13 years 7 months ago
Mechanisms and Dynamics of Cortical Motor Inhibition in the Stop-signal Paradigm: A TMS Study
■ The ability to stop ongoing motor responses in a splitsecond is a vital element of human cognitive control and flexibility that relies in large part on prefrontal cortex. We u...
Wery P. M. van den Wildenberg, Borís Burle,...
« Prev « First page 7671 / 7808 Last » Next »