Search
Now showing items 1-10 of 12
Pay-as-you-go data integration for linked data: opportunities, challenges and architectures
(ACM Digital Library, 2012)
Linked Data (LD) provides principles for publishing data that underpin the development of an emerging web of data. LD follows the web in providing low barriers to entry: publishers can make their data available using a ...
Co.Vi.Wo.: Color Visual Words Based on Non-Predefined Size Codebooks
(IEEE, 2012)
Due to the rapid development of information technology and the continuously increasing number of available multimedia data, the task of retrieving information based on visual content has become a popular subject of scientific ...
SFly: Swarm of Micro Flying Robots
(IEEE (Computer Society), 2012)
The SFly project is an EU-funded project, with
the goal to create a swarm of autonomous vision controlled
micro aerial vehicles. The mission in mind is that a swarm
of MAV’s autonomously maps out an unknown environmen ...
Mobility Management in WSNs using Fuzzy Logic: An Industrial Application Scenario
(IEEE, 2012)
Mobility management in Wireless Sensor Networks is considered to be of an up most importance for today's critical applications. In this paper, we present a soft mobility management solution where the mobility procedures ...
Controlling the Handoff Procedure in an Oil Refinery Environment Using Fuzzy Logic
(IEEE, 2012)
Mobility is one of the most important challenges in a wireless sensor system. Usually, continuous connectivity of a Mobile Node (MN) is achieved by supporting handoff from one connection point to another. In order to ...
Radio Propagation in Industrial Wireless Sensor Network Environments: From Testbed to Simulation Evaluation
(ACM, 2012)
In recent years, sensor networks characteristics have led to incremental utilization in different types of applications. Several techniques have been proposed to evaluate the performance of WSNs; the two most popular being ...
A query scrambler for search privacy on the internet
(Springer Link, 2012-10-09)
We propose a method for search privacy on the Internet, focusing on enhancing plausible deniability against search engine query-logs. The method approximates the target search results, without submitting the intended query ...
An efficient privacy-preserving solution for finding the nearest doctor
(Personal and Ubiquitous Computing volume, 2012-10-30)
In this work, we define the Nearest Doctor Problem for finding the nearest doctor in case of an emergency and present a privacy-preserving protocol for solving it. The solution is based on cryptographic primitives and makes ...
Η προθυμία πληρωμής για την προστασία του περιβάλλοντος ως συνάρτηση των ιδεών για την περιβαλλοντική υποβάθμιση
(2012-09)
Η παρούσα μελέτη παρουσιάζει τη διερεύνηση της προθυμίας του καταναλωτή για την οικονομική ενίσχυση της περιβαλλοντικής προστασίας με κάποιας μορφής εισφοράς.
Η ιδιαιτερότητα της μελέτης εστιάζεται στο γεγονός ότι ...
A privacy-preserving cloud computing system for creating participatory noise maps
(IEEE, 2012)
Participatory sensing is a crowd-sourcing technique which relies both on active contribution of citizens and on their location and mobility patterns. As such, it is particularly vulnerable to privacy concerns, which may ...