Sciweavers

18306 search results - page 3225 / 3662
» Algorithmics in Exponential Time
Sort
View
RSS
2007
105views Robotics» more  RSS 2007»
15 years 5 months ago
Motion Strategies for Surveillance
Abstract— We address the problem of surveillance in an environment with obstacles. We show that the problem of tracking an evader with one pursuer around one corner is completely...
Sourabh Bhattacharya, Salvatore Candido, Seth Hutc...
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 5 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
156
Voted
WONTO
2008
15 years 5 months ago
Personalized Reliable Web service Compositions
Nowadays Internet is anywhere and users can find all possible information. In this situation, the new challenge is to provide the right information at the right time. As Web servic...
Daniela Barreiro Claro, Oriana Licchelli, Patrick ...
ACSW
2006
15 years 5 months ago
Redundant parallel data transfer schemes for the grid environment
In this paper, we proposed dynamic co-allocation schemes for parallel data transfer in a grid environment, which copes up with highly inconsistent network performances of the serv...
Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naoh...
CCCG
2004
15 years 5 months ago
Computing the set of all distant horizons of a terrain
We study the problem of computing the set of all distant horizons of a terrain, represented as either: the set of all edges that appear in the set of all distant horizons; the con...
William S. Evans, Daniel Archambault, David G. Kir...
« Prev « First page 3225 / 3662 Last » Next »