Sciweavers

5344 search results - page 312 / 1069
» Privacy-Preserving Set Operations
Sort
View
CVPR
2003
IEEE
16 years 6 months ago
Clustering Appearances of Objects Under Varying Illumination Conditions
We introduce two appearance-based methods for clustering a set of images of 3-D objects, acquired under varying illumination conditions, into disjoint subsets corresponding to ind...
Jeffrey Ho, Ming-Hsuan Yang, Jongwoo Lim, Kuang-Ch...
CHI
2009
ACM
16 years 5 months ago
Touch and toys: new techniques for interaction with a remote group of robots
Interaction with a remote team of robots in real time is a difficult human-robot interaction (HRI) problem exacerbated by the complications of unpredictable realworld environments...
Cheng Guo, James Everett Young, Ehud Sharlin
OSDI
2008
ACM
16 years 4 months ago
Run-time Energy Consumption Estimation Based on Workload in Server Systems
This paper proposes to develop a system-wide energy consumption model for servers by making use of hardware performance counters and experimental measurements. We develop a real-t...
Adam Lewis, Soumik Ghosh, Nian-Feng Tzeng
SAC
2010
ACM
15 years 11 months ago
A real-time architecture design language for multi-rate embedded control systems
This paper presents a language dedicated to the description of the software architecture of complex embedded control systems. The language relies on the synchronous approach but e...
Julien Forget, Frédéric Boniol, Davi...
DASFAA
2009
IEEE
104views Database» more  DASFAA 2009»
15 years 11 months ago
Tailoring Data Quality Models Using Social Network Preferences
To succeed in their tasks, users need to manage data with the most adequate quality levels possible according to specific data quality models. Typically, data quality assessment co...
Ismael Caballero, Eugenio Verbo, Manuel A. Serrano...