Sciweavers

2706 search results - page 541 / 542
» The case for a new business model
Sort
View
IACR
2011
87views more  IACR 2011»
12 years 10 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
ICIP
1997
IEEE
15 years 8 days ago
Image Coupling, Restoration and Enhancement via PDE's
We present a new approach based on Partial Differential Equations (PDE) to restore noisy blurred images. After studying the methods to denoise images, staying as close as possible...
Pierre Kornprobst, Rachid Deriche, Gilles Aubert
DIALM
2003
ACM
175views Algorithms» more  DIALM 2003»
14 years 4 months ago
Localized construction of bounded degree and planar spanner for wireless ad hoc networks
We propose a novel localized algorithm that constructs a bounded degree and planar spanner for wireless ad hoc networks modeled by unit disk graph (UDG). Every node only has to kn...
Yu Wang 0003, Xiang-Yang Li
IFM
2007
Springer
129views Formal Methods» more  IFM 2007»
14 years 4 months ago
Slotted-Circus
Material Flow Abstraction of Manufacturing Systems. ‣Umberto Costa, Ivan de Medeiros Jr and Marcel Oliveira. Specification and Verification of a MPI Implementation for a MP-SoC...
Andrew Butterfield, Adnan Sherif, Jim Woodcock
ICTAC
2010
Springer
13 years 9 months ago
Preference and Non-deterministic Choice
Material Flow Abstraction of Manufacturing Systems. ‣Umberto Costa, Ivan de Medeiros Jr and Marcel Oliveira. Specification and Verification of a MPI Implementation for a MP-SoC...
Bill Stoddart, Frank Zeyda, Steve Dunne