Sciweavers

2230 search results - page 321 / 446
» Reformulating Constraint Models Using Input Data
Sort
View
BC
2005
83views more  BC 2005»
15 years 2 months ago
Learning visuomotor transformations for gaze-control and grasping
For reaching to and grasping of an object, visual information about the object must be transformed into motor or postural commands for the arm and hand. In this paper, we present a...
Heiko Hoffmann, Wolfram Schenck, Ralf Möller
WWW
2010
ACM
15 years 9 months ago
Privacy wizards for social networking sites
Privacy is an enormous problem in online social networking sites. While sites such as Facebook allow users fine-grained control over who can see their profiles, it is difficult ...
Lujun Fang, Kristen LeFevre
PODS
2011
ACM
163views Database» more  PODS 2011»
14 years 5 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
TON
2010
129views more  TON 2010»
15 years 21 days ago
QoS-based manycasting over optical burst-switched (OBS) networks
Abstract—Many distributed applications require a group of destinations to be coordinated with a single source. Multicasting is a communication paradigm to implement these distrib...
Balagangadhar G. Bathula, Vinod Vokkarane
EUROSYS
2010
ACM
15 years 8 months ago
PUSH: A Dataflow Shell
The deluge of huge data sets such as those provided by sensor networks, online transactions, and the web provide exciting opportunities for data analysis. The scale of the data ...
Noah Evans, Eric Van Hensbergen