Sciweavers

834 search results - page 131 / 167
» Quantifying and Measuring Anonymity
Sort
View
ADMA
2010
Springer
271views Data Mining» more  ADMA 2010»
13 years 5 months ago
Exploiting Concept Clumping for Efficient Incremental E-Mail Categorization
We introduce a novel approach to incremental e-mail categorization based on identifying and exploiting "clumps" of messages that are classified similarly. Clumping reflec...
Alfred Krzywicki, Wayne Wobcke
CCR
2011
13 years 4 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
COGCOM
2011
121views more  COGCOM 2011»
13 years 4 months ago
Eye Movements Show Optimal Average Anticipation with Natural Dynamic Scenes
A less studied component of gaze allocation in dynamic real-world scenes is the time lag of eye movements in responding to dynamic attention-capturing events. Despite the vast amou...
Eleonora Vig, Michael Dorr, Thomas Martinetz, Erha...
JSAC
2010
146views more  JSAC 2010»
13 years 4 months ago
NLOS identification and mitigation for localization based on UWB experimental data
Abstract--Sensor networks can benefit greatly from locationawareness, since it allows information gathered by the sensors to be tied to their physical locations. Ultra-wide bandwid...
Stefano Maranò, Wesley M. Gifford, Henk Wym...
TALG
2010
93views more  TALG 2010»
13 years 4 months ago
Distributed error confinement
We initiate the study of error confinement in distributed applications, where the goal is that only nodes that were directly hit by a fault may deviate from their correct external...
Yossi Azar, Shay Kutten, Boaz Patt-Shamir