Sciweavers

3066 search results - page 391 / 614
» On Facilitating Automated Evaluation
Sort
View
TIME
2009
IEEE
14 years 3 months ago
Preserving Anonymity of Recurrent Location-Based Queries
—The anonymization of location based queries through the generalization of spatio-temporal information has been proposed as a privacy preserving technique. We show that the prese...
Daniele Riboni, Linda Pareschi, Claudio Bettini, S...
P2P
2009
IEEE
101views Communications» more  P2P 2009»
14 years 3 months ago
Monitoring and Management of Structured Peer-to-Peer Systems
The peer-to-peer paradigm shows the potential to provide the same functionality and quality like client/server based systems, but with much lower costs. In order to control the qu...
Kalman Graffi, Dominik Stingl, Julius Rueckert, Al...
IROS
2009
IEEE
144views Robotics» more  IROS 2009»
14 years 2 months ago
Wide-angle localization of intraocular devices from focus
Abstract— Future retinal therapies will be partially automated in order to increase the surgeons’ ability to operate near the sensitive structure of the human eye retina. Untet...
Christos Bergeles, Kamran Shamaei, Jake J. Abbott,...
WAIM
2009
Springer
14 years 2 months ago
An Approach to Detect Collaborative Conflicts for Ontology Development
Ontology has been widely adopted as the basis of knowledge sharing and knowledge-based public services. However, ontology construction is a big challenge, especially in collaborati...
Yewang Chen, Xin Peng, Wenyun Zhao
CAIP
2009
Springer
325views Image Analysis» more  CAIP 2009»
14 years 2 months ago
Finger-Knuckle-Print Verification Based on Band-Limited Phase-Only Correlation
This paper investigates a new automated personal authentication technique using finger-knuckle-print (FKP) imaging. First, a specific data acquisition device is developed to captur...
Lin Zhang, Lei Zhang, David Zhang