-
1
-
-
70549090180
-
-
Likert scale. wikipedia, the free encyclopedia
-
Likert scale. wikipedia, the free encyclopedia
-
-
-
-
2
-
-
70549097280
-
-
Owl web ontology language guide February 2004
-
Owl web ontology language guide (February 2004)
-
-
-
-
3
-
-
70549087049
-
-
Swrl: A semantic web rule language combining owl and ruleml (May 2004)
-
Swrl: A semantic web rule language combining owl and ruleml (May 2004)
-
-
-
-
4
-
-
84869677460
-
-
Responsphere (2007), http://www.responsphere.org
-
(2007)
-
-
-
5
-
-
84869673174
-
-
RFID Tag lookup (2009), http://www.ics.uci.edu/community/events/ openhouse/rfid.php
-
(2009)
-
-
Tag lookup, R.F.I.D.1
-
6
-
-
84869688080
-
-
SAFIRE
-
SAFIRE (2009), http://www.ics.uci.edu/%7Eprojects/cert/verticals.html
-
(2009)
-
-
-
7
-
-
84869688081
-
-
SATrecorder (2009), http://www.ics.uci.edu/%7Eprojects/SATware
-
(2009)
-
-
SATrecorder1
-
8
-
-
0035425253
-
Implementing a sentient computing system
-
Addlesee, M., Curwen, R., Hodges, S., Newman, J., Steggles, P., Ward, A., Hopper, A.: Implementing a sentient computing system. Computer 34(8), 50-56 (2001)
-
(2001)
Computer
, vol.34
, Issue.8
, pp. 50-56
-
-
Addlesee, M.1
Curwen, R.2
Hodges, S.3
Newman, J.4
Steggles, P.5
Ward, A.6
Hopper, A.7
-
10
-
-
0036360781
-
Routing through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
-
Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M., Yi, S.: Routing through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: ICDCS, vol. 22, pp. 74-83 (2002)
-
(2002)
ICDCS
, vol.22
, pp. 74-83
-
-
Al-Muhtadi, J.1
Campbell, R.2
Kapadia, A.3
Mickunas, M.4
Yi, S.5
-
11
-
-
77950855831
-
Situated privaces: Do you know where you mother (trucker) is?
-
Anderson, K., Dourish, P.: Situated privaces: Do you know where you mother (trucker) is? In: Proc. HCI International (2005)
-
(2005)
Proc. HCI International
-
-
Anderson, K.1
Dourish, P.2
-
12
-
-
70549106629
-
-
Buffett, S., Fleming, M.: Applying a Preference Modeling Structure to User Privacy. NRC Publication Number: NRC 49372 (2007)
-
Buffett, S., Fleming, M.: Applying a Preference Modeling Structure to User Privacy. NRC Publication Number: NRC 49372 (2007)
-
-
-
-
13
-
-
30944434221
-
Monitoring streams - a new class of data management applications
-
Technical Report CS-02-04, Brown Computer Science February
-
Carney, D., Cetintemel, U., Cherniack, M., Convey, C., Lee, S., Seidman, G., Stone-braker, M., Tatbul, N., Zdonik, S.: Monitoring streams - a new class of data management applications. Technical Report CS-02-04, Brown Computer Science (February 2007)
-
(2007)
-
-
Carney, D.1
Cetintemel, U.2
Cherniack, M.3
Convey, C.4
Lee, S.5
Seidman, G.6
Stone-braker, M.7
Tatbul, N.8
Zdonik, S.9
-
14
-
-
85158134596
-
-
AAAI, pp
-
Chajewska, U., Koller, D., Parr, R.: Making Rational Decisions Using Adaptive Utility Elicitation. In: AAAI, pp. 363-369 (2000)
-
(2000)
Making Rational Decisions Using Adaptive Utility Elicitation
, pp. 363-369
-
-
Chajewska, U.1
Koller, D.2
Parr, R.3
-
15
-
-
70549112218
-
-
Corsar, D., Sleeman, D., McKenzie, A., Aberdeen, U.: Extending Jess to Handle Uncertainty. In: AI 2007. Springer, Heidelberg (2007)
-
Corsar, D., Sleeman, D., McKenzie, A., Aberdeen, U.: Extending Jess to Handle Uncertainty. In: AI 2007. Springer, Heidelberg (2007)
-
-
-
-
16
-
-
2942654159
-
The Platform for Privacy Preferences 1.0 (P3P1. 0) Specification
-
Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1. 0) Specification. W3C Recommendation, 16 (2002)
-
(2002)
W3C Recommendation
, vol.16
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Presler-Marshall, M.4
Reagle, J.5
-
18
-
-
33746335051
-
Differential privacy
-
Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
-
Dwork, C., et al.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
19
-
-
38149127774
-
Rete: A fast algorithm for the many pattern/many object pattern match problem
-
Forgy, C.: Rete: a fast algorithm for the many pattern/many object pattern match problem. In: IEEE Computer Society Reprint Collection, pp. 324-341 (1991)
-
(1991)
IEEE Computer Society Reprint Collection
, pp. 324-341
-
-
Forgy, C.1
-
21
-
-
34748858582
-
Design and implementation of a middleware for sentient spaces
-
Hore, B., Jafarpour, H., Jain, R., Ji, S., Massaguer, D., Mehrotra, S., Venkatasub-ramanian, N., Westermann, U.: Design and implementation of a middleware for sentient spaces. In: Proceedings of ISI 2007 (2007)
-
(2007)
Proceedings of ISI
-
-
Hore, B.1
Jafarpour, H.2
Jain, R.3
Ji, S.4
Massaguer, D.5
Mehrotra, S.6
Venkatasub-ramanian, N.7
Westermann, U.8
-
22
-
-
70349466549
-
-
Hore, B., Wickramasuriya, J., Mehrotra, S., Venkatasubramanian, N., Massaguer, D.: Privacy-preserving event detection in pervasive spaces. In: PerCom 2009 (2009)
-
Hore, B., Wickramasuriya, J., Mehrotra, S., Venkatasubramanian, N., Massaguer, D.: Privacy-preserving event detection in pervasive spaces. In: PerCom 2009 (2009)
-
-
-
-
23
-
-
38149035174
-
-
Hsieh, G., Tang, K., Low, W., Hong, J.: Field deployment of IMBuddy: A study of privacy control and feedback mechanisms for contextual IM. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, 4717, pp. 91-108. Springer, Heidelberg (2007)
-
Hsieh, G., Tang, K., Low, W., Hong, J.: Field deployment of IMBuddy: A study of privacy control and feedback mechanisms for contextual IM. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 91-108. Springer, Heidelberg (2007)
-
-
-
-
24
-
-
70549109265
-
Getting. The global positioning system
-
Ivan, A.: Getting. The global positioning system. IEEE Spectrum 30(12), 36 (1993)
-
(1993)
IEEE Spectrum
, vol.30
, Issue.12
, pp. 36
-
-
Ivan, A.1
-
25
-
-
85027608326
-
-
Kifer, M., Li, A.: On the semantics of rule-based expert systems with uncertainty. In: Gyssens, M., Van Gucht, D., Paredaens, J. (eds.) ICDT 1988. LNCS, 326, pp. 102-117. Springer, Heidelberg (1988)
-
Kifer, M., Li, A.: On the semantics of rule-based expert systems with uncertainty. In: Gyssens, M., Van Gucht, D., Paredaens, J. (eds.) ICDT 1988. LNCS, vol. 326, pp. 102-117. Springer, Heidelberg (1988)
-
-
-
-
26
-
-
26444479778
-
Optimization by Simulated Annealing
-
Kirkpatrick, S., Gelatt, C.D.J., Vecchi, M.P.: Optimization by Simulated Annealing. Science 220 (4598), 671-680 (1983)
-
(1983)
Science
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick, S.1
Gelatt, C.D.J.2
Vecchi, M.P.3
-
27
-
-
0029342059
-
Distributed simulated annealing algorithms for job shop scheduling
-
July
-
Krishna, K., Ganeshan, K., Ram, D.J.: Distributed simulated annealing algorithms for job shop scheduling. IEEE Transactions on Systems, Man. and Cybernetics 25(7) (July 1995)
-
(1995)
IEEE Transactions on Systems, Man. and Cybernetics
, vol.25
, Issue.7
-
-
Krishna, K.1
Ganeshan, K.2
Ram, D.J.3
-
28
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
Machanavajjhala, A., Kifer, D., Abowd, J., Gehrke, J., Vilhuber, L.: Privacy: Theory meets practice on the map. In: ICDE 2008, pp. 277-286 (2008)
-
(2008)
ICDE 2008
, pp. 277-286
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.3
Gehrke, J.4
Vilhuber, L.5
-
29
-
-
70549101311
-
-
Machanavajjhala, A, Kifer, D, Gehrke, J, Venkitasubramaniam, M, l-Diversity: Privacy Beyond k-Anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity
-
-
-
-
30
-
-
34548748619
-
-
Martin, D., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.: Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. In: ICDE (2007)
-
Martin, D., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.: Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. In: ICDE (2007)
-
-
-
-
31
-
-
70549110161
-
-
Massaguer, D., Balasubramanian, V., Mehrotra, S., Venkatasubramanian, N.: Multi-Agent Simulation of Disaster Response. In: ATDM-AAMAS 2006 (May 2006)
-
Massaguer, D., Balasubramanian, V., Mehrotra, S., Venkatasubramanian, N.: Multi-Agent Simulation of Disaster Response. In: ATDM-AAMAS 2006 (May 2006)
-
-
-
-
32
-
-
0003942663
-
-
Springer-Verlag New York, Inc, Secaucus
-
Pham, D., Karaboga, D.: Intelligent Optimisation Techniques: Genetic Algorithms, Tabu Search, Simulated Annealing and Neural Networks. Springer-Verlag New York, Inc, Secaucus (1998)
-
(1998)
Intelligent Optimisation Techniques: Genetic Algorithms, Tabu Search, Simulated Annealing and Neural Networks
-
-
Pham, D.1
Karaboga, D.2
-
33
-
-
0034539094
-
The Cricket location-support system
-
ACM Press, New York
-
Priyantha, N., Chakraborty, A., Balakrishnan, H.: The Cricket location-support system. In: MobiComp, pp. 32-43. ACM Press, New York (2000)
-
(2000)
MobiComp
, pp. 32-43
-
-
Priyantha, N.1
Chakraborty, A.2
Balakrishnan, H.3
-
35
-
-
4344559647
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Technical report
-
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1998) (Technical report)
-
(1998)
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Samarati, P.1
Sweeney, L.2
-
36
-
-
1642267577
-
-
Schilit, B., LaMarca, A., Borriello, G., Griswold, W., McDonald, D., Lazowska, E., Balachandran, A., Hong, J., Iverson, V.: Challenge: ubiquitous location-aware computing and the place lab initiative. In: WMASH, pp. 29-35. ACM, New York (2003)
-
Schilit, B., LaMarca, A., Borriello, G., Griswold, W., McDonald, D., Lazowska, E., Balachandran, A., Hong, J., Iverson, V.: Challenge: ubiquitous location-aware computing and the" place lab" initiative. In: WMASH, pp. 29-35. ACM, New York (2003)
-
-
-
-
37
-
-
85150403715
-
-
Sweeney, L.: Achieving k-Anonymity Privacy Protection Using Generalization and Suppression. Int'l. journal of uncertainty fuzziness and knowledge based systems 10(5), 571-588 (2002)
-
Sweeney, L.: Achieving k-Anonymity Privacy Protection Using Generalization and Suppression. Int'l. journal of uncertainty fuzziness and knowledge based systems 10(5), 571-588 (2002)
-
-
-
-
38
-
-
85012113183
-
Load shedding in a data stream manager
-
Tatbul, N., Çetintemel, U., Zdonik, S.B., Cherniack, M., Stonebraker, M.: Load shedding in a data stream manager. In: VLDB, pp. 309-320 (2003)
-
(2003)
VLDB
, pp. 309-320
-
-
Tatbul, N.1
Çetintemel, U.2
Zdonik, S.B.3
Cherniack, M.4
Stonebraker, M.5
-
39
-
-
0002322323
-
The basic entity model: A Fundamental Theoretical Model of Information and Information Processing
-
Thow-Yick, L.: The basic entity model: A Fundamental Theoretical Model of Information and Information Processing. Information Processing and Management 30(5), 647-661 (1994)
-
(1994)
Information Processing and Management
, vol.30
, Issue.5
, pp. 647-661
-
-
Thow-Yick, L.1
-
40
-
-
0030196321
-
The basic entity model: A theoretical model of information processing, decision making and information systems
-
Thow-Yick, L.: The basic entity model: A theoretical model of information processing, decision making and information systems. Information Processing and Management 32(4), 477-487 (1996)
-
(1996)
Information Processing and Management
, vol.32
, Issue.4
, pp. 477-487
-
-
Thow-Yick, L.1
-
41
-
-
33845427407
-
-
Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: Cruz, I., Decker, S., Allemang, D., Preist, C., Schwabe, D., Mika, P., Uschold, M., Aroyo, L.M. (eds.) ISWC 2006. LNCS, 4273, pp. 473-486. Springer, Heidelberg (2006)
-
Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: Cruz, I., Decker, S., Allemang, D., Preist, C., Schwabe, D., Mika, P., Uschold, M., Aroyo, L.M. (eds.) ISWC 2006. LNCS, vol. 4273, pp. 473-486. Springer, Heidelberg (2006)
-
-
-
-
42
-
-
0026483978
-
The Active Badge Location System
-
Want, R., Hopper, A., Gibbons, V.: The Active Badge Location System. ACM Transactions on Information Systems 10(1), 91-102 (1992)
-
(1992)
ACM Transactions on Information Systems
, vol.10
, Issue.1
, pp. 91-102
-
-
Want, R.1
Hopper, A.2
Gibbons, V.3
-
43
-
-
13444271747
-
Privacy protecting data collection in media spaces
-
Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: ACM Multimedia 2004 (2004)
-
(2004)
ACM Multimedia 2004
-
-
Wickramasuriya, J.1
Datt, M.2
Mehrotra, S.3
Venkatasubramanian, N.4
|