Sciweavers

8655 search results - page 1299 / 1731
» Challenges for Trusted Computing
Sort
View
ICMCS
2007
IEEE
117views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Digital Media Indexing on the Cell Processor
We present a case study of developing a digital media indexing application, code-named MARVEL, on the STI Cell Broadband Engine (CBE) processor. There are two aspects of the targe...
Lurng-Kuo Liu, Qiang Liu, Apostol Natsev, Kenneth ...
ICRA
2007
IEEE
130views Robotics» more  ICRA 2007»
15 years 10 months ago
Greedy but Safe Replanning under Kinodynamic Constraints
— We consider motion planning problems for a vehicle with kinodynamic constraints, where there is partial knowledge about the environment and replanning is required. We present a...
Kostas E. Bekris, Lydia E. Kavraki
ICRA
2007
IEEE
99views Robotics» more  ICRA 2007»
15 years 10 months ago
RFID-Based Exploration for Large Robot Teams
Abstract— To coordinate a team of robots for exploration is a challenging problem, particularly in large areas as for example the devastated area after a disaster. This problem c...
Vittorio A. Ziparo, Alexander Kleiner, Bernhard Ne...
ICSM
2007
IEEE
15 years 10 months ago
On the prediction of the evolution of libre software projects
Libre (free / open source) software development is a complex phenomenon. Many actors (core developers, casual contributors, bug reporters, patch submitters, users, etc.), in many ...
Israel Herraiz, Jesús M. González-Ba...
IEEEIAS
2007
IEEE
15 years 10 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
« Prev « First page 1299 / 1731 Last » Next »