Sciweavers

947 search results - page 162 / 190
» Information Security in Mobile Databases
Sort
View
WMCSA
2003
IEEE
14 years 4 months ago
River: An Infrastructure for Context Dependent, Reactive Communication Primitives
Applications and services in ubiquitous computing systems often interact in a context-dependent, reactive manner. How information flows, and what services communicate when, is det...
Jong Hee Kang, Matthai Philipose, Gaetano Borriell...
SAC
2008
ACM
13 years 10 months ago
A clustering-based approach for discovering interesting places in trajectories
Because of the large amount of trajectory data produced by mobile devices, there is an increasing need for mechanisms to extract knowledge from this data. Most existing works have...
Andrey Tietbohl Palma, Vania Bogorny, Bart Kuijper...
IROS
2009
IEEE
129views Robotics» more  IROS 2009»
14 years 5 months ago
Using symmetrical regions of interest to improve visual SLAM
— Simultaneous Localization and Mapping (SLAM) based on visual information is a challenging problem. One of the main problems with visual SLAM is to find good quality landmarks,...
Gert Kootstra, Lambert Schomaker
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
15 years 8 days ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
ICPR
2004
IEEE
15 years 22 hour ago
Face Verification System Architecture Using Smart Cards
A smart card based face verification system is proposed in which the feature extraction and decision making is performed on the card. Such an architecture has many privacy and sec...
Josef Kittler, Kieron Messer, Thirimachos Bourlai