Sciweavers

1701 search results - page 324 / 341
» Providing k-anonymity in data mining
Sort
View
EDBT
2008
ACM
112views Database» more  EDBT 2008»
14 years 6 months ago
Ownership protection of shape datasets with geodesic distance preservation
Protection of one's intellectual property is a topic with important technological and legal facets. The significance of this issue is amplified nowadays due to the ease of da...
Michail Vlachos, Claudio Lucchese, Deepak Rajan, P...
CCECE
2006
IEEE
14 years 24 days ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...
MM
2006
ACM
180views Multimedia» more  MM 2006»
14 years 21 days ago
Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation
The identification of near-duplicate keyframe (NDK) pairs is a useful task for a variety of applications such as news story threading and content-based video search. In this pape...
Chong-Wah Ngo, Wanlei Zhao, Yu-Gang Jiang
CIKM
2004
Springer
14 years 4 days ago
Organizing structured web sources by query schemas: a clustering approach
In the recent years, the Web has been rapidly “deepened” with the prevalence of databases online. On this deep Web, many sources are structured by providing structured query i...
Bin He, Tao Tao, Kevin Chen-Chuan Chang
AINA
2010
IEEE
13 years 12 months ago
Towards Adaptive Mobile Mashups: Opportunities for Designing Effective Persuasive Technology on the Road
— Today’s vehicles and on-road infrastructures are equipped with a large number of sophisticated sensory devices. These sensory devices are capable of monitoring and providing ...
Flora Dilys Salim