Sciweavers

750 search results - page 96 / 150
» Desires, Norms and Constraints
Sort
View
CORR
2007
Springer
124views Education» more  CORR 2007»
15 years 1 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
RV
2010
Springer
127views Hardware» more  RV 2010»
15 years 11 days ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
CVPR
2004
IEEE
16 years 4 months ago
Non-Rigid Shape and Motion Recovery: Degenerate Deformations
This paper studies the problem of 3D non-rigid shape and motion recovery from a monocular video sequence, under the degenerate deformations. The shape of a deformable object is re...
Jing Xiao, Takeo Kanade
PODS
2005
ACM
130views Database» more  PODS 2005»
16 years 2 months ago
Composition of mappings given by embedded dependencies
Composition of mappings between schemas is essential to support schema evolution, data exchange, data integration, and other data management tasks. In many applications, mappings ...
Alan Nash, Philip A. Bernstein, Sergey Melnik
VR
2000
IEEE
174views Virtual Reality» more  VR 2000»
15 years 6 months ago
Optimization-Based Virtual Surface Contact Manipulation at Force Control Rates
Previous interactive works have used springs, heuristics, and dynamics for surface placement applications. We present an analytical technique for kilohertz rate manipulation of CA...
Donald D. Nelson, Elaine Cohen