Abstract--Individual privacy will be at risk if a published data set is not properly deidentified. k-Anonymity is a major technique to deidentify a data set. Among a number of k-an...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
This paper began its life as an unpublished technical review [20] of the proposed Open Grid Services Architecture (OGSA) as described in the papers, "The Physiology of the Gr...
Dennis Gannon, Kenneth Chiu, Madhusudhan Govindara...
This paper discusses a novel distributed adaptive algorithm and representation used to construct populations of adaptive Web agents. These InfoSpiders browse networked information ...
We present a mathematical model for network routing based on generating paths in a consistent direction. Our development is based on an algebraic and geometric framework for defini...
We present method and implementation to acquire deformable models of elastic objects. The method is based on the Green's functions matrix representation of an elastic solid. ...