We propose a location-based query anonymization technique, LBS (k,T)-anonymization, that ensures anonymity of user's query in a specific time window against what we call know...
Amirreza Masoumzadeh, James Joshi, Hassan A. Karim...
Privacy preservation has recently received considerable attention for location-based mobile services. Various location cloaking approaches have been proposed to protect the locati...
This paper addresses the problem of selecting the `optimal' variable subset in a logistic regression model for a medium-sized data set. As a case study, we take the British En...
The polynomial path order (POP for short) is a termination method that induces polynomial bounds on the innermost runtime complexity of term rewrite systems (TRSs for short). Seman...
We present an implemented model for speech recognition in natural environments which relies on contextual information about salient entities to prime utterance recognition. The hyp...
This paper describes cdiprover3 a tool for proving termination of term rewrite systems by polynomial interpretations and context dependent interpretations. The methods used by cdip...
Abstract. When merging belief functions, Dempster rule of combination is justified only when sources can be considered as independent. When dependencies are ill-known, it is usual ...
For a presented case, a Bayesian network classifier in essence computes a posterior probability distribution over its class variable. Based upon this distribution, the classifier...
Linda C. van der Gaag, Silja Renooij, Wilma Steene...