Sciweavers

6269 search results - page 1215 / 1254
» Turning data into knowledge
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...
SP
2010
IEEE
192views Security Privacy» more  SP 2010»
13 years 11 months ago
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation
—Captchas are designed to be easy for humans but hard for machines. However, most recent research has focused only on making them hard for machines. In this paper, we present wha...
Elie Bursztein, Steven Bethard, Celine Fabry, John...
WCNC
2010
IEEE
13 years 11 months ago
Radio Resource Management in OFDMA-Based Cellular Networks Enhanced with Fixed and Nomadic Relays
—The provision of very high data rates in a ubiquitous manner throughout the service area is a great challenge for 4G and beyond-4G wireless networks. Towards that end, the deplo...
Mohamed Salem, Abdulkareem Adinoyi, Halim Yanikome...
EDBT
2009
ACM
156views Database» more  EDBT 2009»
13 years 11 months ago
Efficient skyline retrieval with arbitrary similarity measures
A skyline query returns a set of objects that are not dominated by other objects. An object is said to dominate another if it is closer to the query than the latter on all factors...
Deepak P, Prasad M. Deshpande, Debapriyo Majumdar,...
EDBT
2009
ACM
106views Database» more  EDBT 2009»
13 years 11 months ago
AlphaSum: size-constrained table summarization using value lattices
Consider a scientist who wants to explore multiple data sets to select the relevant ones for further analysis. Since the visualization real estate may put a stringent constraint o...
K. Selçuk Candan, Huiping Cao, Yan Qi 0002,...
« Prev « First page 1215 / 1254 Last » Next »