Sciweavers

3688 search results - page 690 / 738
» Requirements of Phylogenetic Databases
Sort
View
GIS
2007
ACM
14 years 10 months ago
Location anonymity in continuous location-based services
A major concern for large-scale deployment of location-based services (LBSs) is the potential abuse of their client location data, which may imply sensitive personal information. ...
Toby Xu, Ying Cai
GIS
2009
ACM
14 years 10 months ago
Augmenting Cartographic Resources for Autonomous Driving
In this paper we present algorithms for automatically generating a road network description from aerial imagery. The road network inforamtion (RNI) produced by our algorithm inclu...
Young-Woo Seo, Chris Urmson, David Wettergreen Ji...
ICIP
2009
IEEE
14 years 10 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
GIS
2003
ACM
14 years 10 months ago
Statistical tools for regional data analysis using GIS
A GIS provides a powerful collection of tools for the management, visualization and analysis of spatial data. These tools can be even more powerful when they are integrated with s...
Konstantin Krivoruchko, Carol A. Gotway, Alex Zhig...
GIS
2004
ACM
14 years 10 months ago
Exploiting online sources to accurately geocode addresses
Many Geographic Information System (GIS) applications require the conversion of an address to geographic coordinates. This process is called geocoding. The traditional geocoding m...
Rahul Bakshi, Craig A. Knoblock, Snehal Thakkar