Search

Your search keyword '"Distribution, Recherche d'Information et Mobilité (DRIM)"' showing total 209 results

Search Constraints

Start Over You searched for: Author "Distribution, Recherche d'Information et Mobilité (DRIM)" Remove constraint Author: "Distribution, Recherche d'Information et Mobilité (DRIM)" Topic 02 engineering and technology Remove constraint Topic: 02 engineering and technology
209 results on '"Distribution, Recherche d'Information et Mobilité (DRIM)"'

Search Results

1. Design Choices for X-vector Based Speaker Anonymization

2. Privacy in Big Data

3. Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud/Fog Computing

4. DataConf: A full client-side Web mashup for scientific conferences

5. Automatic Privacy and Utility Preservation for Mobility Data: A Nonlinear Model-Based Approach

6. Anytime mining of sequential discriminative patterns in labeled sequences

7. EDEN: Enforcing Location Privacy through Re-identification Risk Assessment: A Federated Learning Approach

8. The Long Road to Computational Location Privacy: A Survey

9. Computer Aided Formal Design of Swarm Robotics Algorithms

10. GraphSIF: analyzing flow of payments in a Business-to-Business network to detect supplier impersonation

11. Recommandation diversifiée via des processus ponctuels déterminantaux sur des graphes de connaissances

12. Towards Practical Privacy-Preserving Collaborative Machine Learning at a Scale

13. TailX: Scheduling Heterogeneous Multiget Queries to Improve Tail Latencies in Key-Value Stores

14. Supplier Impersonation Fraud Detection using Bayesian Inference

15. Towards an Inference Detection System Against Multi-database Attacks

16. An Exploratory Analysis on Users' Contributions in Federated Learning

17. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems

18. MooD: MObility Data Privacy as Orphan Disease -Experimentation and Deployment Paper

19. PrivaTube

20. A Transparent Referendum Protocol with Immutable Proceedings and Verifiable Outcome for Trustless Networks

21. Supplier Impersonation Fraud Detection in Business-To-Business Transaction Networks Using Self-Organizing Maps

22. Synchronous Gathering without Multiplicity Detection: a Certified Algorithm

23. 4PR: Privacy preserving routing in mobile delay tolerant networks

24. Predicting Query Difficulty in IR: Impact of Difficulty Definition

25. SeqScout: Using a Bandit Model to Discover Interesting Subgroups in Labeled Sequences

26. CrowdED and CREX: Towards Easy Crowdsourcing Quality Control Evaluation

27. RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems

28. Dataset shift quantification for credit card fraud detection

29. Formal Methods for Mobile Robots

30. DEvIR: Data Collection and Analysis for the Recommendation of Events and Itineraries

31. Multiple perspectives HMM-based feature engineering for credit card fraud detection

32. Continuous vs. Discrete Asynchronous Moves: A Certified Approach for Mobile Robots

33. Recommendation of activity sequences during distributed events

34. EActors: fast and flexible trusted computing using SGX

35. Brief Announcement Continuous vs. Discrete Asynchronous Moves: A Certified Approach for Mobile Robots

36. Géo-localisation basée sur des connaissances d'images annotées

37. Intrusion Detection Using Mouse Dynamics

38. Héron: Taming Tail Latencies in Key-Value Stores under Heterogeneous Workloads

39. HMC: Robust Privacy Protection of Mobility Data against Multiple Re-Identification Attacks

40. Critical Analysis of LPL according to Articles 12 - 14 of the GDPR

41. A Control-Theoretic Approach for Location Privacy in Mobile Applications

42. LPL, Towards a GDPR-Compliant Privacy Language: Formal Definition and Usage

43. CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions

44. ACCIO: How to Make Location Privacy Experimentation Open and Easy

45. Towards Dynamic End-to-End Privacy Preserving Data Classification

46. Dynamic Modeling of Location Privacy Protection Mechanisms

47. Can Adaptive Feedforward Control Improve Operation of Cloud Services?

48. X-Search: Revisiting Private Web Search using Intel SGX

49. TournaRank: when retrieval becomes document competition

50. Sequence Classification for Credit-Card Fraud Detection

Catalog

Books, media, physical & digital resources