Sciweavers

435 search results - page 68 / 87
» Distributionally Robust Control of Constrained Stochastic Sy...
Sort
View
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
MM
2000
ACM
144views Multimedia» more  MM 2000»
15 years 8 months ago
Integrating drawing tools with behavioral modeling in digital painting
Our goal is to integrate traditional artistic media that demand hand dexterity (such as drawing) with intelligent systems techniques that may both constrain and nourish this dexte...
Elpida Tzafestas
DIM
2005
ACM
15 years 6 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
SC
2004
ACM
15 years 9 months ago
Collaborative User-Centric Lambda-Grid over Wavelength-Routed Network
Emerging lambda-Grid systems employ wavelength-routed network with optical switches to enable dynamic on-demand lightpaths with multi-gigabit rate bandwidth to interconnect shared...
Oliver T. Yu, Thomas A. DeFanti
SIGCSE
2012
ACM
284views Education» more  SIGCSE 2012»
13 years 11 months ago
Teaching operating systems using android
The computing landscape is shifting towards mobile devices. To learn about operating systems, it is increasingly important for students to gain hands-on kernel programming experie...
Jeremy Andrus, Jason Nieh