Sciweavers

211 search results - page 32 / 43
» Privacy Protected Query Processing on Spatial Networks
Sort
View
SAC
2009
ACM
14 years 1 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
ADBIS
2006
Springer
181views Database» more  ADBIS 2006»
14 years 3 months ago
Searching for Similar Trajectories on Road Networks Using Spatio-temporal Similarity
In order to search similar moving object trajectories, the previously used methods focused on Euclidean distance and considered only spatial similarity. Euclidean distance is not a...
Jung-Rae Hwang, Hye-Young Kang, Ki-Joune Li
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
14 years 9 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
ACSAC
2006
IEEE
14 years 3 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
CIVR
2007
Springer
178views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Layout indexing of trademark images
Ensuring the uniqueness of trademark images and protecting their identities are the most important objectives for the trademark registration process. To prevent trademark infringe...
Reinier H. van Leuken, M. Fatih Demirci, Victoria ...