Sciweavers

834 search results - page 131 / 167
» Quantifying and Measuring Anonymity
Sort
View
165
Voted
ADMA
2010
Springer
271views Data Mining» more  ADMA 2010»
14 years 10 months ago
Exploiting Concept Clumping for Efficient Incremental E-Mail Categorization
We introduce a novel approach to incremental e-mail categorization based on identifying and exploiting "clumps" of messages that are classified similarly. Clumping reflec...
Alfred Krzywicki, Wayne Wobcke
147
Voted
CCR
2011
14 years 10 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
129
Voted
COGCOM
2011
121views more  COGCOM 2011»
14 years 10 months ago
Eye Movements Show Optimal Average Anticipation with Natural Dynamic Scenes
A less studied component of gaze allocation in dynamic real-world scenes is the time lag of eye movements in responding to dynamic attention-capturing events. Despite the vast amou...
Eleonora Vig, Michael Dorr, Thomas Martinetz, Erha...
JSAC
2010
146views more  JSAC 2010»
14 years 10 months ago
NLOS identification and mitigation for localization based on UWB experimental data
Abstract--Sensor networks can benefit greatly from locationawareness, since it allows information gathered by the sensors to be tied to their physical locations. Ultra-wide bandwid...
Stefano Maranò, Wesley M. Gifford, Henk Wym...
138
Voted
TALG
2010
93views more  TALG 2010»
14 years 10 months ago
Distributed error confinement
We initiate the study of error confinement in distributed applications, where the goal is that only nodes that were directly hit by a fault may deviate from their correct external...
Yossi Azar, Shay Kutten, Boaz Patt-Shamir