Sciweavers

4233 search results - page 670 / 847
» Three Paths to Effectiveness
Sort
View
PVLDB
2010
121views more  PVLDB 2010»
15 years 3 months ago
Personalized Privacy Protection in Social Networks
Due to the popularity of social networks, many proposals have been proposed to protect the privacy of the networks. All these works assume that the attacks use the same background...
Mingxuan Yuan, Lei Chen 0002, Philip S. Yu
147
Voted
SCIENTOMETRICS
2010
109views more  SCIENTOMETRICS 2010»
15 years 3 months ago
To publish or not to publish? On the aggregation and drivers of research performance
This paper presents a methodology to aggregate multidimensional research output. Using a tailored version of the non-parametric Data Envelopment Analysis model, we account for the...
Kristof De Witte, Nicky Rogge
TIFS
2010
132views more  TIFS 2010»
15 years 3 months ago
JPEG error analysis and its applications to digital image forensics
JPEG is one of the most extensively used image formats. Understanding the inherent characteristics of JPEG may play a useful role in digital image forensics. In this paper, we int...
Weiqi Luo, Jiwu Huang, Guoping Qiu
TOH
2010
74views more  TOH 2010»
15 years 3 months ago
Vibrotactile Feedback for Information Delivery in the Vehicle
—As technology advances, more functions have been, and continue to be added to the vehicle, resulting in increased needs for improved user interfaces. In this paper, we investiga...
Jonghyun Ryu, Jaemin Chun, Gunhyuk Park, Seungmoon...
TON
2010
141views more  TON 2010»
15 years 3 months ago
Weighted spectral distribution for internet topology analysis: theory and applications
Abstract—Comparing graphs to determine the level of underlying structural similarity between them is a widely encountered problem in computer science. It is particularly relevant...
Damien Fay, Hamed Haddadi, Andrew Thomason, Andrew...