Sciweavers

947 search results - page 154 / 190
» Information Security in Mobile Databases
Sort
View
RAS
2010
136views more  RAS 2010»
13 years 9 months ago
A realistic benchmark for visual indoor place recognition
An important competence for a mobile robot system is the ability to localize and perform context interpretation. This is required to perform basic navigation and to facilitate loc...
Andrzej Pronobis, Barbara Caputo, Patric Jensfelt,...
DMIN
2006
115views Data Mining» more  DMIN 2006»
14 years 10 days ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...
CCS
2011
ACM
12 years 11 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
CAIP
2005
Springer
120views Image Analysis» more  CAIP 2005»
14 years 4 months ago
A New Approach to Camera Image Indexing
Abstract. This paper presents a color filter array (CFA) image indexing approach. To enhance the functionality of single-sensor consumer electronics such as digital cameras, imagi...
Rastislav Lukac, Konstantinos N. Plataniotis
NAR
2002
98views more  NAR 2002»
13 years 10 months ago
Recent improvements to the SMART domain-based sequence annotation resource
SMART (Simple Modular Architecture Research Tool, http://smart.embl-heidelberg.de) is a web-based resource used for the annotation of protein domains and the analysis of domain ar...
Ivica Letunic, Leo Goodstadt, Nicholas J. Dickens,...