Sciweavers

2099 search results - page 207 / 420
» Distributed constraint optimization with structured resource...
Sort
View
131
Voted
DAWAK
2006
Springer
15 years 4 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
138
Voted
CVPR
2011
IEEE
14 years 8 months ago
Energy Based Multiple Model Fitting for Non-Rigid Structure from Motion
In this paper we reformulate the 3D reconstruction of deformable surfaces from monocular video sequences as a labeling problem. We solve simultaneously for the assignment of featu...
Chris Russell, Joao Fayad, Lourdes Agapito
98
Voted
DAC
2001
ACM
16 years 1 months ago
Battery-Aware Static Scheduling for Distributed Real-Time Embedded Systems
This paper addresses battery-aware static scheduling in batterypowered distributed real-time embedded systems. As suggested by previous work, reducing the discharge current level ...
Jiong Luo, Niraj K. Jha
99
Voted
CDC
2008
IEEE
129views Control Systems» more  CDC 2008»
15 years 7 months ago
Distributed subgradient methods and quantization effects
Abstract— We consider a convex unconstrained optimization problem that arises in a network of agents whose goal is to cooperatively optimize the sum of the individual agent objec...
Angelia Nedic, Alexander Olshevsky, Asuman E. Ozda...
74
Voted
ISORC
2007
IEEE
15 years 7 months ago
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Co...
Christoph Becker, Sebastian Staamann, Ralf Salomon