Sciweavers

811 search results - page 89 / 163
» When Novelty Is Not Enough
Sort
View
MDM
2010
Springer
301views Communications» more  MDM 2010»
14 years 1 months ago
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
CDC
2009
IEEE
189views Control Systems» more  CDC 2009»
14 years 1 months ago
Maximizing aggregated revenue in sensor networks under deadline constraints
Abstract— We study the problem of maximizing the aggregated revenue in sensor networks with deadline constraints. Our model is that of a sensor network that is arranged in the fo...
Srikanth Hariharan, Ness B. Shroff
CEC
2009
IEEE
14 years 1 months ago
Differential evolution: Difference vectors and movement in solution space
Abstract—In the commonly used DE/rand/1 variant of differential evolution the primary mechanism of generating new solutions is the perturbation of a randomly selected point by a ...
James Montgomery
IWAN
2001
Springer
14 years 1 months ago
Deploying an Active Voice Application on a Three-Level Active Network Node Architecture
Active networks have been recently highlighted as a key enabling technology to obtain immense flexibility in terms of network deployment, configurability, and customized packet pro...
Georg Carle, Henning Sanneck, Sebastian Zander, Lo...
ACSC
2000
IEEE
14 years 1 months ago
Needles and Haystacks: A Search Engine for Personal Information Collections
Information retrieval systems can be partitioned into two main classes: large-scale systems that make use of an inverted index or some other auxiliary data structure, intended for...
Owen de Kretser, Alistair Moffat