Sciweavers

5344 search results - page 260 / 1069
» Privacy-Preserving Set Operations
Sort
View
123
Voted
CIBSE
2009
ACM
15 years 10 months ago
A two-level formal semantics for the QVT language
Model Driven Engineering (MDE) proposes a software development process in which software is built by constructing one or more models, and transforming these into other models. In t...
Roxana S. Giandini, Claudia Pons, Gabriela P&eacut...
159
Voted
CISS
2008
IEEE
15 years 10 months ago
Imperfect randomized algorithms for the optimal control of wireless networks
Abstract— We consider a joint randomized scheduling, congestion control mechanism for general wireless networks. We allow for a set of imperfections in the operation of the rando...
Atilla Eryilmaz, Asuman E. Ozdaglar, Devavrat Shah...
115
Voted
ICONS
2008
IEEE
15 years 10 months ago
Using User Preferences to Enhance Privacy in Pervasive Systems
With the increasing interest in developing pervasive computing technologies there is growing recognition of the problems of maintaining user privacy. In the Daidalos pervasive sys...
Elizabeth Papadopoulou, Sarah McBurney, Nick K. Ta...
122
Voted
ICPR
2008
IEEE
15 years 10 months ago
A computer vision based camera pedestal's vertical motion control
. Traditional camera pedestals are manually operated. Our long term goal is to construct a fully autonomous pedestal system which can respond to changes in a scene and mimicking t...
Richard Yi Da Xu, Joshua M. Brown, Jason M. Traish...
104
Voted
VR
2008
IEEE
110views Virtual Reality» more  VR 2008»
15 years 10 months ago
Transparent Cockpit: Visual Assistance System for Vehicle Using Retro-reflective Projection Technology
Camera / Camera For safety and operability of drivers while operating a vehicle, it is very important to obtain a wide field of vision. However, the space available for setting up...
Takumi Yoshida, Kensei Jo, Kouta Minamizawa, Hidea...