Sciweavers

62 search results - page 9 / 13
» A new algorithm for normal dominance constraints
Sort
View
FOCS
2007
IEEE
15 years 3 months ago
Mechanism Design via Differential Privacy
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic age...
Frank McSherry, Kunal Talwar
ICRA
2007
IEEE
140views Robotics» more  ICRA 2007»
15 years 3 months ago
Dribbling Control of Omnidirectional Soccer Robots
Abstract— This paper focuses on the dribbling control problem of an omnidirectional mobile robot. Because the movement of the dribbled object must be considered, dribbling contro...
Xiang Li, Maosen Wang, Andreas Zell
WG
2005
Springer
15 years 3 months ago
Hypertree Decompositions: Structure, Algorithms, and Applications
We review the concepts of hypertree decomposition and hypertree width from a graph theoretical perspective and report on a number of recent results related to these concepts. We al...
Georg Gottlob, Martin Grohe, Nysret Musliu, Marko ...
INFOSCALE
2007
ACM
14 years 11 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
TIP
2008
116views more  TIP 2008»
14 years 9 months ago
Variational Bayesian Image Restoration Based on a Product of t-Distributions Image Prior
Image priors based on products have been recognized to offer many advantages because they allow simultaneous enforcement of multiple constraints. However, they are inconvenient for...
Giannis K. Chantas, Nikolas P. Galatsanos, Aristid...