Sciweavers

5255 search results - page 908 / 1051
» Formal Methods for Privacy
Sort
View
125
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding
— While the practical coding scheme [1] has been shown to be able to improve throughput of wireless networks, there still lacks fundamental understanding on how the coding scheme...
Jilin Le, John C. S. Lui, Dah-Ming Chiu
124
Voted
IROS
2008
IEEE
156views Robotics» more  IROS 2008»
15 years 10 months ago
Bayesian state estimation and behavior selection for autonomous robotic exploration in dynamic environments
— In order to be truly autonomous, robots that operate in natural, populated environments must have the ability to create a model of these unpredictable dynamic environments and ...
Georgios Lidoris, Dirk Wollherr, Martin Buss
ISORC
2008
IEEE
15 years 10 months ago
Cyber Physical Systems: Design Challenges
Cyber-Physical Systems (CPS) are integrations of computation and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedb...
Edward A. Lee
103
Voted
IWPC
2008
IEEE
15 years 10 months ago
Ensuring Well-Behaved Usage of APIs through Syntactic Constraints
Libraries are the most widespreaded form of software reuse. In order to properly use a library API, its clients should fulfill a series of (many times implicit) assumptions made ...
Martin Feilkas, Daniel Ratiu
144
Voted
CIDM
2007
IEEE
15 years 10 months ago
Mining Subspace Correlations
— In recent applications of clustering such as gene expression microarray analysis, collaborative filtering, and web mining, object similarity is no longer measured by physical ...
Rave Harpaz, Robert M. Haralick