Sciweavers

1061 search results - page 82 / 213
» Integrity Constraints for Linked Data
Sort
View
DEBU
2007
131views more  DEBU 2007»
15 years 3 months ago
Future Trends in Secure Chip Data Management
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be care...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
MOBICOM
1996
ACM
15 years 8 months ago
TCP Extensions for Space Communications
The space communication environment and mobile and wireless communication environments show many similarities when observed from the perspective of a transport protocol. Both type...
Robert C. Durst, Gregory J. Miller, Eric J. Travis
125
Voted
ICPR
2006
IEEE
16 years 5 months ago
Data Fusion for 3D Gestures Tracking using a Camera mounted on a Robot
This article describes a multiple feature data fusion applied to an auxiliary particle filter for markerless tracking of 3D two-arm gestures by using a single camera mounted on a ...
Paulo Menezes, Frédéric Lerasle, Jor...
PKDD
2009
Springer
170views Data Mining» more  PKDD 2009»
15 years 10 months ago
Statistical Relational Learning with Formal Ontologies
Abstract. We propose a learning approach for integrating formal knowledge into statistical inference by exploiting ontologies as a semantically rich and fully formal representation...
Achim Rettinger, Matthias Nickles, Volker Tresp
217
Voted
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
16 years 5 months ago
MultiRelational k-Anonymity
k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much...
Mehmet Ercan Nergiz, Chris Clifton, A. Erhan Nergi...